Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-38475
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache HTTP Server |
Version: 2.4.0 ≤ 2.4.59 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:apache:http_server:2.4.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "http_server", "vendor": "apache", "versions": [ { "lessThanOrEqual": "2.4.59", "status": "affected", "version": "2.4.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:netapp:ontap_9:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ontap_9", "vendor": "netapp", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-38475", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-10T03:55:18.658443Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-31T20:24:11.619Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-09-13T17:04:56.456Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://www.blackhat.com/us-24/briefings/schedule/index.html#confusion-attacks-exploiting-hidden-semantic-ambiguity-in-apache-http-server-pre-recorded-40227" }, { "url": "https://github.com/apache/httpd/commit/9a6157d1e2f7ab15963020381054b48782bc18cf" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://httpd.apache.org/security/vulnerabilities_24.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240712-0001/" }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/01/8" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Apache HTTP Server", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "2.4.59", "status": "affected", "version": "2.4.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Orange Tsai (@orange_8361) from DEVCORE" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are\u0026nbsp;permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. \u003cbr\u003e\u003cbr\u003eSubstitutions in\u0026nbsp;server context that use a backreferences or variables as the first segment of the substitution are affected.\u0026nbsp; Some unsafe RewiteRules will be broken by this change and the rewrite flag \"UnsafePrefixStat\" can be used to opt back in once ensuring the substitution is appropriately constrained." } ], "value": "Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are\u00a0permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. \n\nSubstitutions in\u00a0server context that use a backreferences or variables as the first segment of the substitution are affected.\u00a0 Some unsafe RewiteRules will be broken by this change and the rewrite flag \"UnsafePrefixStat\" can be used to opt back in once ensuring the substitution is appropriately constrained." } ], "metrics": [ { "other": { "content": { "text": "important" }, "type": "Textual description of severity" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-116", "description": "CWE-116 Improper Encoding or Escaping of Output", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-12T14:06:09.772Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://httpd.apache.org/security/vulnerabilities_24.html" }, { "url": "https://security.netapp.com/advisory/ntap-20240712-0001/" } ], "source": { "discovery": "UNKNOWN" }, "timeline": [ { "lang": "en", "time": "2024-04-01T12:00:00.000Z", "value": "reported" } ], "title": "Apache HTTP Server weakness in mod_rewrite when first segment of substitution matches filesystem path.", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2024-38475", "datePublished": "2024-07-01T18:15:12.292Z", "dateReserved": "2024-06-17T11:09:56.096Z", "dateUpdated": "2025-02-13T17:53:13.638Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-38475\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2024-07-01T19:15:04.883\",\"lastModified\":\"2024-11-21T09:26:03.180\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are\u00a0permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. \\n\\nSubstitutions in\u00a0server context that use a backreferences or variables as the first segment of the substitution are affected.\u00a0 Some unsafe RewiteRules will be broken by this change and the rewrite flag \\\"UnsafePrefixStat\\\" can be used to opt back in once ensuring the substitution is appropriately constrained.\"},{\"lang\":\"es\",\"value\":\"El escape inadecuado de la salida en mod_rewrite en Apache HTTP Server 2.4.59 y versiones anteriores permite a un atacante asignar URL a ubicaciones del sistema de archivos que el servidor permite servir, pero a las que no se puede acceder intencional o directamente mediante ninguna URL, dando como resultado la ejecuci\u00f3n del c\u00f3digo o la divulgaci\u00f3n del c\u00f3digo fuente. Las sustituciones en el contexto del servidor que utilizan referencias inversas o variables como primer segmento de la sustituci\u00f3n se ven afectadas. Este cambio romper\u00e1 algunas RewiteRules inseguras y el indicador de reescritura \\\"UnsafePrefixStat\\\" se puede usar para volver a participar una vez que se garantice que la sustituci\u00f3n est\u00e9 restringida adecuadamente.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-116\"}]}],\"references\":[{\"url\":\"https://httpd.apache.org/security/vulnerabilities_24.html\",\"source\":\"security@apache.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20240712-0001/\",\"source\":\"security@apache.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/07/01/8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/apache/httpd/commit/9a6157d1e2f7ab15963020381054b48782bc18cf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://httpd.apache.org/security/vulnerabilities_24.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20240712-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.blackhat.com/us-24/briefings/schedule/index.html#confusion-attacks-exploiting-hidden-semantic-ambiguity-in-apache-http-server-pre-recorded-40227\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.blackhat.com/us-24/briefings/schedule/index.html#confusion-attacks-exploiting-hidden-semantic-ambiguity-in-apache-http-server-pre-recorded-40227\"}, {\"url\": \"https://github.com/apache/httpd/commit/9a6157d1e2f7ab15963020381054b48782bc18cf\"}, {\"url\": \"https://httpd.apache.org/security/vulnerabilities_24.html\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240712-0001/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2024/07/01/8\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-09-13T17:04:56.456Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-38475\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-07-10T03:55:18.658443Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:apache:http_server:2.4.0:*:*:*:*:*:*:*\"], \"vendor\": \"apache\", \"product\": \"http_server\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.4.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"2.4.59\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:a:netapp:ontap_9:-:*:*:*:*:*:*:*\"], \"vendor\": \"netapp\", \"product\": \"ontap_9\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"*\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-05T18:02:10.851Z\"}}], \"cna\": {\"title\": \"Apache HTTP Server weakness in mod_rewrite when first segment of substitution matches filesystem path.\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Orange Tsai (@orange_8361) from DEVCORE\"}], \"metrics\": [{\"other\": {\"type\": \"Textual description of severity\", \"content\": {\"text\": \"important\"}}}], \"affected\": [{\"vendor\": \"Apache Software Foundation\", \"product\": \"Apache HTTP Server\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.4.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"2.4.59\"}], \"defaultStatus\": \"unaffected\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2024-04-01T12:00:00.000Z\", \"value\": \"reported\"}], \"references\": [{\"url\": \"https://httpd.apache.org/security/vulnerabilities_24.html\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240712-0001/\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are\\u00a0permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. \\n\\nSubstitutions in\\u00a0server context that use a backreferences or variables as the first segment of the substitution are affected.\\u00a0 Some unsafe RewiteRules will be broken by this change and the rewrite flag \\\"UnsafePrefixStat\\\" can be used to opt back in once ensuring the substitution is appropriately constrained.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are\u0026nbsp;permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. \u003cbr\u003e\u003cbr\u003eSubstitutions in\u0026nbsp;server context that use a backreferences or variables as the first segment of the substitution are affected.\u0026nbsp; Some unsafe RewiteRules will be broken by this change and the rewrite flag \\\"UnsafePrefixStat\\\" can be used to opt back in once ensuring the substitution is appropriately constrained.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-116\", \"description\": \"CWE-116 Improper Encoding or Escaping of Output\"}]}], \"providerMetadata\": {\"orgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"shortName\": \"apache\", \"dateUpdated\": \"2024-07-12T14:06:09.772Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-38475\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-13T17:53:13.638Z\", \"dateReserved\": \"2024-06-17T11:09:56.096Z\", \"assignerOrgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"datePublished\": \"2024-07-01T18:15:12.292Z\", \"assignerShortName\": \"apache\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
ncsc-2024-0464
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "SonicWall heeft kwetsbaarheden verholpen in de SMA100 SSLVPN (Specifiek voor firmware versies 10.2.1.13-72sv en eerder).", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden in de SonicWall SMA100 SSLVPN omvatten een heap-gebaseerde buffer overflow, een stack-gebaseerde buffer overflow, en een probleem met de certificaatvereiste tijdens authenticatie. Deze kwetsbaarheden kunnen door remote geauthenticeerde aanvallers worden misbruikt om willekeurige code uit te voeren op de getroffen systemen, wat kan leiden tot ongeautoriseerde toegang en controle over gevoelige gegevens. Daarnaast is er een zwakte in de pseudo-willekeurige getallengenerator (PRNG) die de integriteit van SSLVPN-verbindingen in gevaar kan brengen.", "title": "Interpretaties" }, { "category": "description", "text": "SonicWall heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)", "title": "CWE-338" }, { "category": "general", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" }, { "category": "general", "text": "Use of Hard-coded Credentials", "title": "CWE-798" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0018" } ], "title": "Kwetsbaarheden verholpen in SonicWall SMA100 SSLVPN", "tracking": { "current_release_date": "2024-12-06T11:48:08.461746Z", "id": "NCSC-2024-0464", "initial_release_date": "2024-12-06T11:48:08.461746Z", "revision_history": [ { "date": "2024-12-06T11:48:08.461746Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "sma100", "product": { "name": "sma100", "product_id": "CSAFPID-549085", "product_identification_helper": { "cpe": "cpe:2.3:a:sonicwall:sma100:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sma100", "product": { "name": "sma100", "product_id": "CSAFPID-1737326", "product_identification_helper": { "cpe": "cpe:2.3:a:sonicwall:sma100:10.2.1.13-72sv:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sma100_firmware", "product": { "name": "sma100_firmware", "product_id": "CSAFPID-1737602", "product_identification_helper": { "cpe": "cpe:2.3:o:sonicwall:sma100_firmware:*:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "sonicwall" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "references": [ { "category": "self", "summary": "CVE-2024-38475", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json" } ], "title": "CVE-2024-38475" }, { "cve": "CVE-2024-40763", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-549085", "CSAFPID-1737602" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40763", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40763.json" } ], "title": "CVE-2024-40763" }, { "cve": "CVE-2024-45318", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-549085", "CSAFPID-1737602" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45318", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45318.json" } ], "title": "CVE-2024-45318" }, { "cve": "CVE-2024-45319", "cwe": { "id": "CWE-798", "name": "Use of Hard-coded Credentials" }, "notes": [ { "category": "other", "text": "Use of Hard-coded Credentials", "title": "CWE-798" } ], "product_status": { "known_affected": [ "CSAFPID-549085" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45319", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45319.json" } ], "title": "CVE-2024-45319" }, { "cve": "CVE-2024-53702", "cwe": { "id": "CWE-338", "name": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)" }, "notes": [ { "category": "other", "text": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)", "title": "CWE-338" } ], "product_status": { "known_affected": [ "CSAFPID-549085", "CSAFPID-1737602" ] }, "references": [ { "category": "self", "summary": "CVE-2024-53702", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53702.json" } ], "title": "CVE-2024-53702" }, { "cve": "CVE-2024-53703", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-549085", "CSAFPID-1737602" ] }, "references": [ { "category": "self", "summary": "CVE-2024-53703", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53703.json" } ], "title": "CVE-2024-53703" } ] }
ncsc-2024-0411
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Oracle heeft kwetsbaarheden verholpen in diverse Database producten en subsystemen, zoals de Core database, Application Express, Autonomous Health Framework, Essbase, GoldenGate, SQL Developer en Secure Backup.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipuleren van data\n- Toegang tot gevoelige gegevens", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" }, { "category": "general", "text": "Observable Timing Discrepancy", "title": "CWE-208" }, { "category": "general", "text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)", "title": "CWE-776" }, { "category": "general", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" }, { "category": "general", "text": "Improper Handling of Exceptional Conditions", "title": "CWE-755" }, { "category": "general", "text": "Excessive Iteration", "title": "CWE-834" }, { "category": "general", "text": "Inefficient Algorithmic Complexity", "title": "CWE-407" }, { "category": "general", "text": "Improper Handling of Case Sensitivity", "title": "CWE-178" }, { "category": "general", "text": "Incorrect Permission Assignment for Critical Resource", "title": "CWE-732" }, { "category": "general", "text": "Double Free", "title": "CWE-415" }, { "category": "general", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" }, { "category": "general", "text": "Uncontrolled Search Path Element", "title": "CWE-427" }, { "category": "general", "text": "Encoding Error", "title": "CWE-172" }, { "category": "general", "text": "Integer Overflow to Buffer Overflow", "title": "CWE-680" }, { "category": "general", "text": "Untrusted Search Path", "title": "CWE-426" }, { "category": "general", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" }, { "category": "general", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" }, { "category": "general", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "general", "text": "Observable Discrepancy", "title": "CWE-203" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "Files or Directories Accessible to External Parties", "title": "CWE-552" }, { "category": "general", "text": "Authorization Bypass Through User-Controlled Key", "title": "CWE-639" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "CWE-275", "title": "CWE-275" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" }, { "category": "general", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "general", "text": "Exposure of Resource to Wrong Sphere", "title": "CWE-668" }, { "category": "general", "text": "Inclusion of Functionality from Untrusted Control Sphere", "title": "CWE-829" }, { "category": "general", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "general", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" }, { "category": "general", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "general", "text": "Improper Privilege Management", "title": "CWE-269" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Improper Neutralization of Alternate XSS Syntax", "title": "CWE-87" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" }, { "category": "general", "text": "CWE-18", "title": "CWE-18" }, { "category": "general", "text": "Covert Timing Channel", "title": "CWE-385" }, { "category": "general", "text": "Unchecked Input for Loop Condition", "title": "CWE-606" }, { "category": "general", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "general", "text": "Detection of Error Condition Without Action", "title": "CWE-390" }, { "category": "general", "text": "Improperly Controlled Sequential Memory Allocation", "title": "CWE-1325" }, { "category": "general", "text": "Truncation of Security-relevant Information", "title": "CWE-222" }, { "category": "general", "text": "Incorrect Calculation of Buffer Size", "title": "CWE-131" }, { "category": "general", "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "title": "CWE-59" }, { "category": "general", "text": "Missing Critical Step in Authentication", "title": "CWE-304" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; hkcert; nvd; oracle; redhat", "url": "https://www.oracle.com/security-alerts/cpuoct2024.html" } ], "title": "Kwetsbaarheden verholpen in Oracle Database producten", "tracking": { "current_release_date": "2024-10-17T13:15:19.595269Z", "id": "NCSC-2024-0411", "initial_release_date": "2024-10-17T13:15:19.595269Z", "revision_history": [ { "date": "2024-10-17T13:15:19.595269Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "database_-_grid", "product": { "name": "database_-_grid", "product_id": "CSAFPID-1673504", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_grid:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_grid", "product": { "name": "database_-_grid", "product_id": "CSAFPID-1673506", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_grid:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_core", "product": { "name": "database_-_core", "product_id": "CSAFPID-1673386", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_core:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_core", "product": { "name": "database_-_core", "product_id": "CSAFPID-1673385", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_core:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_core", "product": { "name": "database_-_core", "product_id": "CSAFPID-1673442", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_core:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_security", "product": { "name": "database_-_security", "product_id": "CSAFPID-1673507", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_security:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_security", "product": { "name": "database_-_security", "product_id": "CSAFPID-1673509", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_security:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_security", "product": { "name": "database_-_security", "product_id": "CSAFPID-1673508", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_security:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph_mapviewer", "product": { "name": "spatial_and_graph_mapviewer", "product_id": "CSAFPID-912561", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph_mapviewer:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph", "product": { "name": "spatial_and_graph", "product_id": "CSAFPID-764250", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph", "product": { "name": "spatial_and_graph", "product_id": "CSAFPID-1673511", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph", "product": { "name": "spatial_and_graph", "product_id": "CSAFPID-1673512", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph", "product": { "name": "spatial_and_graph", "product_id": "CSAFPID-816800", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph:23.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph", "product": { "name": "spatial_and_graph", "product_id": "CSAFPID-1673529", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fleet_patching_and_provisioning_-_micronaut", "product": { "name": "fleet_patching_and_provisioning_-_micronaut", "product_id": "CSAFPID-1673492", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:fleet_patching_and_provisioning_-_micronaut:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fleet_patching_and_provisioning", "product": { "name": "fleet_patching_and_provisioning", "product_id": "CSAFPID-1503603", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:fleet_patching_and_provisioning:23.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_xml_database", "product": { "name": "database_-_xml_database", "product_id": "CSAFPID-1673445", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_xml_database:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_xml_database", "product": { "name": "database_-_xml_database", "product_id": "CSAFPID-1673443", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_xml_database:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_xml_database", "product": { "name": "database_-_xml_database", "product_id": "CSAFPID-1673444", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_xml_database:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_java_vm", "product": { "name": "database_-_java_vm", "product_id": "CSAFPID-1673451", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_java_vm:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_java_vm", "product": { "name": "database_-_java_vm", "product_id": "CSAFPID-1673450", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_java_vm:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_java_vm", "product": { "name": "database_-_java_vm", "product_id": "CSAFPID-1673452", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_java_vm:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autonomous_health_framework", "product": { "name": "autonomous_health_framework", "product_id": "CSAFPID-816798", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autonomous_health_framework", "product": { "name": "autonomous_health_framework", "product_id": "CSAFPID-816799", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:23.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autonomous_health_framework", "product": { "name": "autonomous_health_framework", "product_id": "CSAFPID-1673525", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:prior_to_24.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-912046", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-1503299", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-816855", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-816361", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-912045", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-1503302", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-912044", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-1503306", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:22.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-816852", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition20.3.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-912600", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition20.3.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-816853", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition21.3.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-912601", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition21.3.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-816854", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition22.3.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sqlcl", "product": { "name": "sqlcl", "product_id": "CSAFPID-816801", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sqlcl:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sqlcl", "product": { "name": "sqlcl", "product_id": "CSAFPID-1673405", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sqlcl:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express_administration", "product": { "name": "application_express_administration", "product_id": "CSAFPID-764731", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express_administration:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express_customers_plugin", "product": { "name": "application_express_customers_plugin", "product_id": "CSAFPID-764732", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express_customers_plugin:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express_team_calendar_plugin", "product": { "name": "application_express_team_calendar_plugin", "product_id": "CSAFPID-764733", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express_team_calendar_plugin:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express", "product": { "name": "application_express", "product_id": "CSAFPID-266119", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express", "product": { "name": "application_express", "product_id": "CSAFPID-1673510", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express:23.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express", "product": { "name": "application_express", "product_id": "CSAFPID-1503575", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express:23.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express", "product": { "name": "application_express", "product_id": "CSAFPID-1673188", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express:24.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autonomous_health_framework", "product": { "name": "autonomous_health_framework", "product_id": "CSAFPID-765238", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:19c:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autonomous_health_framework", "product": { "name": "autonomous_health_framework", "product_id": "CSAFPID-765239", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:21c:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "blockchain_platform", "product": { "name": "blockchain_platform", "product_id": "CSAFPID-764779", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "blockchain_platform", "product": { "name": "blockchain_platform", "product_id": "CSAFPID-89587", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:blockchain_platform:21.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-765259", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:_security_and_provisioning___21.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-187448", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-94075", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-220886", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.4.3.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-611394", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.5.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-816317", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.5.3.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-912567", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.5.4.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-1503612", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.5.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-1673479", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_essbase", "product": { "name": "oracle_essbase", "product_id": "CSAFPID-1650506", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_essbase:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-816845", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-1650825", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.18:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-1673404", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-1650831", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:21.3-21.14.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data", "product": { "name": "goldengate_big_data", "product_id": "CSAFPID-764274", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_stream_analytics", "product": { "name": "goldengate_stream_analytics", "product_id": "CSAFPID-764752", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_stream_analytics", "product": { "name": "goldengate_stream_analytics", "product_id": "CSAFPID-1673384", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.0-19.1.0.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_stream_analytics", "product": { "name": "goldengate_stream_analytics", "product_id": "CSAFPID-220192", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_stream_analytics", "product": { "name": "goldengate_stream_analytics", "product_id": "CSAFPID-220193", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_studio", "product": { "name": "goldengate_studio", "product_id": "CSAFPID-816846", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_studio:12.2.0.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_studio", "product": { "name": "goldengate_studio", "product_id": "CSAFPID-611390", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_studio:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_studio", "product": { "name": "goldengate_studio", "product_id": "CSAFPID-764803", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_studio:fusion_middleware_12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_veridata", "product": { "name": "goldengate_veridata", "product_id": "CSAFPID-764275", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_veridata:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-342816", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1650767", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0-19.23.0.0.240716:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-485902", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1503736", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:19.23.0.0.240716:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-219912", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:19c:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1503739", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:21.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1650765", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:21.3-21.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1503738", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:21.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_goldengate_stream_analytics", "product": { "name": "oracle_goldengate_stream_analytics", "product_id": "CSAFPID-1650515", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_goldengate_stream_analytics:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "management_pack_for__goldengate", "product": { "name": "management_pack_for__goldengate", "product_id": "CSAFPID-764861", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:management_pack_for__goldengate:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "management_pack_for__goldengate", "product": { "name": "management_pack_for__goldengate", "product_id": "CSAFPID-1503640", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:management_pack_for__goldengate:12.2.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_goldengate_studio", "product": { "name": "oracle_goldengate_studio", "product_id": "CSAFPID-1650835", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_goldengate_studio:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_goldengate", "product": { "name": "oracle_goldengate", "product_id": "CSAFPID-1650575", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_goldengate:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-764813", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1503661", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:1.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1503663", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:1.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673497", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:1.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-764764", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:19.5.33:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-764765", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:20.3.28:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673491", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:20.3.40:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-764766", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:21.2.55:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673495", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:21.2.71:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-764767", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:22.3.26:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673493", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:22.3.45:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673489", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:23.3.33:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673488", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:24.1.17:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1650757", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_19.5.42:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1650758", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_20.3.40:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1650761", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_21.2.27:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1650760", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_22.3.46:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1650759", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_23.3.32:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_nosql_database", "product": { "name": "oracle_nosql_database", "product_id": "CSAFPID-1650584", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_nosql_database:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_secure_backup", "product": { "name": "oracle_secure_backup", "product_id": "CSAFPID-1650563", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_secure_backup:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-667692", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-345049", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-611417", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-1673422", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:19.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_sql_developer", "product": { "name": "oracle_sql_developer", "product_id": "CSAFPID-1650638", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_sql_developer:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sql_developer", "product": { "name": "sql_developer", "product_id": "CSAFPID-764822", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sql_developer:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sql_developer", "product": { "name": "sql_developer", "product_id": "CSAFPID-220643", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sql_developer:21.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sql_developer", "product": { "name": "sql_developer", "product_id": "CSAFPID-816870", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sql_developer:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sql_developer", "product": { "name": "sql_developer", "product_id": "CSAFPID-816871", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sql_developer:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sql_developer", "product": { "name": "sql_developer", "product_id": "CSAFPID-1673397", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sql_developer:24.3.0:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle" }, { "branches": [ { "category": "product_name", "name": "oracle_application_express", "product": { "name": "oracle_application_express", "product_id": "CSAFPID-1673144", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle_corporation:oracle_application_express:24.1:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle_corporation" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1471", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-220886", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764822", "CSAFPID-1650515", "CSAFPID-1650638", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-89587", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044" ] }, "references": [ { "category": "self", "summary": "CVE-2022-1471", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-1471.json" } ], "title": "CVE-2022-1471" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "notes": [ { "category": "other", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "other", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" } ], "product_status": { "known_affected": [ "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-342816", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-764752", "CSAFPID-764275", "CSAFPID-764861", "CSAFPID-266119", "CSAFPID-187448", "CSAFPID-219912", "CSAFPID-765238", "CSAFPID-765239", "CSAFPID-765259", "CSAFPID-667692", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-764250", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2022-34169", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-34169.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-342816", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-764752", "CSAFPID-764275", "CSAFPID-764861", "CSAFPID-266119", "CSAFPID-187448", "CSAFPID-219912", "CSAFPID-765238", "CSAFPID-765239", "CSAFPID-765259", "CSAFPID-667692", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-764250", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2022-34169" }, { "cve": "CVE-2022-36033", "cwe": { "id": "CWE-87", "name": "Improper Neutralization of Alternate XSS Syntax" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Alternate XSS Syntax", "title": "CWE-87" }, { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-220886", "CSAFPID-94075", "CSAFPID-764803", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764861", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-266119", "CSAFPID-187448", "CSAFPID-1650515", "CSAFPID-1650835", "CSAFPID-219912", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-667692", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-1503575", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-912567", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2022-36033", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36033.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-220886", "CSAFPID-94075", "CSAFPID-764803", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764861", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-266119", "CSAFPID-187448", "CSAFPID-1650515", "CSAFPID-1650835", "CSAFPID-219912", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-667692", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-1503575", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-912567", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2022-36033" }, { "cve": "CVE-2022-37454", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "other", "text": "Integer Overflow to Buffer Overflow", "title": "CWE-680" } ], "product_status": { "known_affected": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-1650563", "CSAFPID-89587", "CSAFPID-764861" ] }, "references": [ { "category": "self", "summary": "CVE-2022-37454", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-37454.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-1650563", "CSAFPID-89587", "CSAFPID-764861" ] } ], "title": "CVE-2022-37454" }, { "cve": "CVE-2022-38136", "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2022-38136", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-38136.json" } ], "title": "CVE-2022-38136" }, { "cve": "CVE-2022-40196", "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2022-40196", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-40196.json" } ], "title": "CVE-2022-40196" }, { "cve": "CVE-2022-41342", "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2022-41342", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41342.json" } ], "title": "CVE-2022-41342" }, { "cve": "CVE-2022-42919", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "other", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" }, { "category": "other", "text": "Improper Privilege Management", "title": "CWE-269" } ], "product_status": { "known_affected": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2022-42919", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42919.json" } ], "title": "CVE-2022-42919" }, { "cve": "CVE-2022-45061", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Inefficient Algorithmic Complexity", "title": "CWE-407" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2022-45061", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-45061.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-89587" ] } ], "title": "CVE-2022-45061" }, { "cve": "CVE-2022-46337", "product_status": { "known_affected": [ "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-764752", "CSAFPID-764275", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-764250", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-342816", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-816361", "CSAFPID-764813", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692" ] }, "references": [ { "category": "self", "summary": "CVE-2022-46337", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-46337.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-764752", "CSAFPID-764275", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-764250", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-342816", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-816361", "CSAFPID-764813", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692" ] } ], "title": "CVE-2022-46337" }, { "cve": "CVE-2023-2976", "cwe": { "id": "CWE-552", "name": "Files or Directories Accessible to External Parties" }, "notes": [ { "category": "other", "text": "Files or Directories Accessible to External Parties", "title": "CWE-552" } ], "product_status": { "known_affected": [ "CSAFPID-1650584", "CSAFPID-1650835", "CSAFPID-1650506", "CSAFPID-1650515", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-342816", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-764813", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692", "CSAFPID-89587", "CSAFPID-1673397", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-345049", "CSAFPID-816801", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-611417", "CSAFPID-764250", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-2976", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2976.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1650584", "CSAFPID-1650835", "CSAFPID-1650506", "CSAFPID-1650515", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-342816", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-764813", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692", "CSAFPID-89587", "CSAFPID-1673397", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-345049", "CSAFPID-816801", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-611417", "CSAFPID-764250", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-2976" }, { "cve": "CVE-2023-4043", "cwe": { "id": "CWE-834", "name": "Excessive Iteration" }, "notes": [ { "category": "other", "text": "Excessive Iteration", "title": "CWE-834" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1673405", "CSAFPID-1673397", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-4043", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4043.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673405", "CSAFPID-1673397", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-4043" }, { "cve": "CVE-2023-4759", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "other", "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "title": "CWE-59" }, { "category": "other", "text": "Improper Handling of Case Sensitivity", "title": "CWE-178" } ], "product_status": { "known_affected": [ "CSAFPID-1673397", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2023-4759", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4759.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673397", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2023-4759" }, { "cve": "CVE-2023-4863", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-342816", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801" ] }, "references": [ { "category": "self", "summary": "CVE-2023-4863", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4863.json" } ], "title": "CVE-2023-4863" }, { "cve": "CVE-2023-5072", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1650575", "CSAFPID-1650515", "CSAFPID-1650835", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5072", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5072.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650575", "CSAFPID-1650515", "CSAFPID-1650835", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-5072" }, { "cve": "CVE-2023-26031", "cwe": { "id": "CWE-426", "name": "Untrusted Search Path" }, "notes": [ { "category": "other", "text": "Untrusted Search Path", "title": "CWE-426" } ], "product_status": { "known_affected": [ "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26031", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26031.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2023-26031" }, { "cve": "CVE-2023-26551", "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26551", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26551.json" } ], "scores": [ { "cvss_v3": { "baseScore": 0.0, "baseSeverity": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-26551" }, { "cve": "CVE-2023-26552", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26552", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26552.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-26552" }, { "cve": "CVE-2023-26553", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26553", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26553.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-26553" }, { "cve": "CVE-2023-26554", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26554", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26554.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-26554" }, { "cve": "CVE-2023-26555", "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26555", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26555.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-26555" }, { "cve": "CVE-2023-28484", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-764250", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-816317", "CSAFPID-764813", "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-345049", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-611417", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-667692", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] }, "references": [ { "category": "self", "summary": "CVE-2023-28484", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28484.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-764250", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-816317", "CSAFPID-764813", "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-345049", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-611417", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-667692", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] } ], "title": "CVE-2023-28484" }, { "cve": "CVE-2023-29469", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Double Free", "title": "CWE-415" } ], "product_status": { "known_affected": [ "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-816317", "CSAFPID-89587", "CSAFPID-220886", "CSAFPID-342816", "CSAFPID-345049", "CSAFPID-764752", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-667692", "CSAFPID-764813", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764250", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] }, "references": [ { "category": "self", "summary": "CVE-2023-29469", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29469.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-816317", "CSAFPID-89587", "CSAFPID-220886", "CSAFPID-342816", "CSAFPID-345049", "CSAFPID-764752", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-667692", "CSAFPID-764813", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764250", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] } ], "title": "CVE-2023-29469" }, { "cve": "CVE-2023-33201", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-1650584", "CSAFPID-1673397", "CSAFPID-912561", "CSAFPID-345049", "CSAFPID-611390", "CSAFPID-611417", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-33201", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33201.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-1650584", "CSAFPID-1673397", "CSAFPID-912561", "CSAFPID-345049", "CSAFPID-611390", "CSAFPID-611417", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-33201" }, { "cve": "CVE-2023-37920", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "other", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "other", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612" ] }, "references": [ { "category": "self", "summary": "CVE-2023-37920", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-37920.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612" ] } ], "title": "CVE-2023-37920" }, { "cve": "CVE-2023-39410", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1673404", "CSAFPID-1673384", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] }, "references": [ { "category": "self", "summary": "CVE-2023-39410", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39410.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673404", "CSAFPID-1673384", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] } ], "title": "CVE-2023-39410" }, { "cve": "CVE-2023-44487", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1650757", "CSAFPID-1650758", "CSAFPID-1650759", "CSAFPID-1650760", "CSAFPID-1650761", "CSAFPID-89587", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503603", "CSAFPID-1503575", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-44487", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650757", "CSAFPID-1650758", "CSAFPID-1650759", "CSAFPID-1650760", "CSAFPID-1650761", "CSAFPID-89587", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503603", "CSAFPID-1503575", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-44487" }, { "cve": "CVE-2023-44981", "cwe": { "id": "CWE-639", "name": "Authorization Bypass Through User-Controlled Key" }, "notes": [ { "category": "other", "text": "Authorization Bypass Through User-Controlled Key", "title": "CWE-639" } ], "product_status": { "known_affected": [ "CSAFPID-1650515", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601" ] }, "references": [ { "category": "self", "summary": "CVE-2023-44981", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44981.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1650515", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601" ] } ], "title": "CVE-2023-44981" }, { "cve": "CVE-2023-45288", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-45288", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45288.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-45288" }, { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-222", "name": "Truncation of Security-relevant Information" }, "notes": [ { "category": "other", "text": "Truncation of Security-relevant Information", "title": "CWE-222" } ], "product_status": { "known_affected": [ "CSAFPID-1650765", "CSAFPID-1650757", "CSAFPID-1650758", "CSAFPID-1650767", "CSAFPID-1650759", "CSAFPID-1650760", "CSAFPID-1650761", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503575", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-48795", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1650765", "CSAFPID-1650757", "CSAFPID-1650758", "CSAFPID-1650767", "CSAFPID-1650759", "CSAFPID-1650760", "CSAFPID-1650761", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503575", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-48795" }, { "cve": "CVE-2023-49083", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2023-49083", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49083.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2023-49083" }, { "cve": "CVE-2023-51384", "cwe": { "id": "CWE-304", "name": "Missing Critical Step in Authentication" }, "notes": [ { "category": "other", "text": "Missing Critical Step in Authentication", "title": "CWE-304" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-51384", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51384.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-51384" }, { "cve": "CVE-2023-51385", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-51385", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51385.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-51385" }, { "cve": "CVE-2023-52425", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2023-52425", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52425.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2023-52425" }, { "cve": "CVE-2023-52426", "cwe": { "id": "CWE-776", "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)" }, "notes": [ { "category": "other", "text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)", "title": "CWE-776" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2023-52426", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52426.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2023-52426" }, { "cve": "CVE-2024-1874", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-1874", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1874.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-1874" }, { "cve": "CVE-2024-2408", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "other", "text": "Observable Discrepancy", "title": "CWE-203" }, { "category": "other", "text": "Observable Timing Discrepancy", "title": "CWE-208" }, { "category": "other", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" }, { "category": "other", "text": "Covert Timing Channel", "title": "CWE-385" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-2408", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2408.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-2408" }, { "cve": "CVE-2024-2511", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improperly Controlled Sequential Memory Allocation", "title": "CWE-1325" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-2511", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2511.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-2511" }, { "cve": "CVE-2024-4577", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" }, { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-4577", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4577.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-4577" }, { "cve": "CVE-2024-4603", "cwe": { "id": "CWE-606", "name": "Unchecked Input for Loop Condition" }, "notes": [ { "category": "other", "text": "Unchecked Input for Loop Condition", "title": "CWE-606" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-4603", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4603.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-4603" }, { "cve": "CVE-2024-4741", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-4741", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4741.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-4741" }, { "cve": "CVE-2024-5458", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5458", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5458.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-5458" }, { "cve": "CVE-2024-5535", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" } ], "product_status": { "known_affected": [ "CSAFPID-1673508", "CSAFPID-1673525" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5535", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673508", "CSAFPID-1673525" ] } ], "title": "CVE-2024-5535" }, { "cve": "CVE-2024-5585", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "notes": [ { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" }, { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "other", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5585", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5585.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-5585" }, { "cve": "CVE-2024-6119", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" } ], "product_status": { "known_affected": [ "CSAFPID-1673508", "CSAFPID-1673525" ] }, "references": [ { "category": "self", "summary": "CVE-2024-6119", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6119.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673508", "CSAFPID-1673525" ] } ], "title": "CVE-2024-6119" }, { "cve": "CVE-2024-6232", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "other", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" } ], "references": [ { "category": "self", "summary": "CVE-2024-6232", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json" } ], "title": "CVE-2024-6232" }, { "cve": "CVE-2024-7264", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1673529", "CSAFPID-1673479", "CSAFPID-1673511", "CSAFPID-1673512" ] }, "references": [ { "category": "self", "summary": "CVE-2024-7264", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7264.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673529", "CSAFPID-1673479", "CSAFPID-1673511", "CSAFPID-1673512" ] } ], "title": "CVE-2024-7264" }, { "cve": "CVE-2024-7592", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2024-7592", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json" } ], "title": "CVE-2024-7592" }, { "cve": "CVE-2024-21131", "product_status": { "known_affected": [ "CSAFPID-1503299", "CSAFPID-1503306", "CSAFPID-1503302", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21131", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21131.json" } ], "title": "CVE-2024-21131" }, { "cve": "CVE-2024-21138", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21138", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21138.json" } ], "title": "CVE-2024-21138" }, { "cve": "CVE-2024-21140", "product_status": { "known_affected": [ "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503299", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21140", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21140.json" } ], "title": "CVE-2024-21140" }, { "cve": "CVE-2024-21144", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21144", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21144.json" } ], "title": "CVE-2024-21144" }, { "cve": "CVE-2024-21145", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1503299", "CSAFPID-1503306", "CSAFPID-1503302", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21145", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21145.json" } ], "title": "CVE-2024-21145" }, { "cve": "CVE-2024-21147", "product_status": { "known_affected": [ "CSAFPID-1503306", "CSAFPID-1503302", "CSAFPID-1503299", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21147", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21147.json" } ], "title": "CVE-2024-21147" }, { "cve": "CVE-2024-21233", "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21233", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21233.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] } ], "title": "CVE-2024-21233" }, { "cve": "CVE-2024-21242", "product_status": { "known_affected": [ "CSAFPID-1673443", "CSAFPID-1673444", "CSAFPID-1673445" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21242", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21242.json" } ], "scores": [ { "cvss_v3": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-1673443", "CSAFPID-1673444", "CSAFPID-1673445" ] } ], "title": "CVE-2024-21242" }, { "cve": "CVE-2024-21251", "product_status": { "known_affected": [ "CSAFPID-1673450", "CSAFPID-1673451", "CSAFPID-1673452" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21251", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21251.json" } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673450", "CSAFPID-1673451", "CSAFPID-1673452" ] } ], "title": "CVE-2024-21251" }, { "cve": "CVE-2024-21261", "product_status": { "known_affected": [ "CSAFPID-1673144", "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21261", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21261.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673144", "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-21261" }, { "cve": "CVE-2024-22018", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22018", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22018.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-22018" }, { "cve": "CVE-2024-22020", "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22020", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22020.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-22020" }, { "cve": "CVE-2024-22201", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1673384", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22201", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22201.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673384", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-22201" }, { "cve": "CVE-2024-23807", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1650831", "CSAFPID-1650825", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23807", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23807.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650831", "CSAFPID-1650825", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-23807" }, { "cve": "CVE-2024-23944", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23944", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23944.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-23944" }, { "cve": "CVE-2024-24989", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-24989", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24989.json" } ], "title": "CVE-2024-24989" }, { "cve": "CVE-2024-24990", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-24990", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24990.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-24990" }, { "cve": "CVE-2024-25710", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1673384", "CSAFPID-816871", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-342816", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-912046", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-25710", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1673384", "CSAFPID-816871", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-342816", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-912046", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-25710" }, { "cve": "CVE-2024-26130", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-26130", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26130.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-26130" }, { "cve": "CVE-2024-26308", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1673384", "CSAFPID-816871", "CSAFPID-816798", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-26308", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1673384", "CSAFPID-816871", "CSAFPID-816798", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-26308" }, { "cve": "CVE-2024-27983", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27983", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27983.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-27983" }, { "cve": "CVE-2024-28182", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Detection of Error Condition Without Action", "title": "CWE-390" }, { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1673442", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28182", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673442", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-28182" }, { "cve": "CVE-2024-28849", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28849", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-28849" }, { "cve": "CVE-2024-28887", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "other", "text": "Uncontrolled Search Path Element", "title": "CWE-427" } ], "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28887", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28887.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] } ], "title": "CVE-2024-28887" }, { "cve": "CVE-2024-29025", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1673488", "CSAFPID-1673489", "CSAFPID-1673491", "CSAFPID-1673492", "CSAFPID-1673493", "CSAFPID-1673495", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29025", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1673488", "CSAFPID-1673489", "CSAFPID-1673491", "CSAFPID-1673492", "CSAFPID-1673493", "CSAFPID-1673495", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-29025" }, { "cve": "CVE-2024-29131", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1673497", "CSAFPID-1673397", "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29131", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29131.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1673497", "CSAFPID-1673397", "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-29131" }, { "cve": "CVE-2024-29133", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1673497", "CSAFPID-1673397", "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29133", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1673497", "CSAFPID-1673397", "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-29133" }, { "cve": "CVE-2024-31079", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-31079", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31079.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-31079" }, { "cve": "CVE-2024-32760", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32760", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32760.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-32760" }, { "cve": "CVE-2024-34161", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34161", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34161.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-34161" }, { "cve": "CVE-2024-34750", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "other", "text": "Improper Handling of Exceptional Conditions", "title": "CWE-755" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1673504", "CSAFPID-1673506" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34750", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673504", "CSAFPID-1673506" ] } ], "title": "CVE-2024-34750" }, { "cve": "CVE-2024-35200", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-35200", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35200.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-35200" }, { "cve": "CVE-2024-36137", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" }, { "category": "other", "text": "Incorrect Permission Assignment for Critical Resource", "title": "CWE-732" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-36137", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36137.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-36137" }, { "cve": "CVE-2024-36138", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-36138", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36138.json" } ], "title": "CVE-2024-36138" }, { "cve": "CVE-2024-36387", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-36387", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36387.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-36387" }, { "cve": "CVE-2024-37370", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-1673507", "CSAFPID-1673508", "CSAFPID-1673509" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37370", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673507", "CSAFPID-1673508", "CSAFPID-1673509" ] } ], "title": "CVE-2024-37370" }, { "cve": "CVE-2024-37371", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-1673507", "CSAFPID-1673508", "CSAFPID-1673509" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37371", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673507", "CSAFPID-1673508", "CSAFPID-1673509" ] } ], "title": "CVE-2024-37371" }, { "cve": "CVE-2024-37372", "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37372", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37372.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-37372" }, { "cve": "CVE-2024-38356", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-1673510", "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38356", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38356.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673510", "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-38356" }, { "cve": "CVE-2024-38357", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-1673510", "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38357", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38357.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673510", "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-38357" }, { "cve": "CVE-2024-38472", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38472", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38472.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38472" }, { "cve": "CVE-2024-38473", "cwe": { "id": "CWE-172", "name": "Encoding Error" }, "notes": [ { "category": "other", "text": "Encoding Error", "title": "CWE-172" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38473", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38473.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38473" }, { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-172", "name": "Encoding Error" }, "notes": [ { "category": "other", "text": "Encoding Error", "title": "CWE-172" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38474", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38474.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38474" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38475", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38475" }, { "cve": "CVE-2024-38476", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Inclusion of Functionality from Untrusted Control Sphere", "title": "CWE-829" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38476", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38476.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38476" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38477", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38477.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38477" }, { "cve": "CVE-2024-38998", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "notes": [ { "category": "other", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" } ], "product_status": { "known_affected": [ "CSAFPID-1673511", "CSAFPID-1673512", "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38998", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673511", "CSAFPID-1673512", "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-38998" }, { "cve": "CVE-2024-38999", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "notes": [ { "category": "other", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" } ], "product_status": { "known_affected": [ "CSAFPID-1673511", "CSAFPID-1673512", "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38999", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json" } ], "scores": [ { "cvss_v3": { "baseScore": 10.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673511", "CSAFPID-1673512", "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-38999" }, { "cve": "CVE-2024-39573", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-39573", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39573.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-39573" }, { "cve": "CVE-2024-39884", "cwe": { "id": "CWE-18", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-18", "title": "CWE-18" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-39884", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39884.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-39884" }, { "cve": "CVE-2024-40725", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Exposure of Resource to Wrong Sphere", "title": "CWE-668" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40725", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40725.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479" ] } ], "title": "CVE-2024-40725" }, { "cve": "CVE-2024-40898", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40898", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40898.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479" ] } ], "title": "CVE-2024-40898" }, { "cve": "CVE-2024-45490", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "other", "text": "Incorrect Calculation of Buffer Size", "title": "CWE-131" } ], "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45490", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] } ], "title": "CVE-2024-45490" }, { "cve": "CVE-2024-45491", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45491", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] } ], "title": "CVE-2024-45491" }, { "cve": "CVE-2024-45492", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45492", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] } ], "title": "CVE-2024-45492" }, { "cve": "CVE-2024-45801", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "other", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" }, { "category": "other", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" } ], "product_status": { "known_affected": [ "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45801", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45801.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-45801" } ] }
ncsc-2024-0275
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Apache Software Foundation heeft kwetsbaarheden verholpen in de Apache HTTP-Server.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken, middels een Server-Side-Request-Forgery (SSRF) verkeer te manipuleren, of om code uit te voeren binnen de webserver, waarvoor de kwaadwillende aanvankelijk niet is geautoriseerd.", "title": "Interpretaties" }, { "category": "description", "text": "Apache Software Foundation heeft updates uitgebracht om de kwetsbaarheden te verhelpen in Apache HTTP-Server 2.4.60. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" }, { "category": "general", "text": "Encoding Error", "title": "CWE-172" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Inclusion of Functionality from Untrusted Control Sphere", "title": "CWE-829" }, { "category": "general", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; ibm; nvd; redhat", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "title": "Kwetsbaarheden verholpen in Apache HHTP-server", "tracking": { "current_release_date": "2024-07-02T11:44:22.653047Z", "id": "NCSC-2024-0275", "initial_release_date": "2024-07-02T11:44:22.653047Z", "revision_history": [ { "date": "2024-07-02T11:44:22.653047Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "apache_http_server", "product": { "name": "apache_http_server", "product_id": "CSAFPID-1465466", "product_identification_helper": { "cpe": "cpe:2.3:a:apache_software_foundation:apache_http_server:2.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "apache_http_server", "product": { "name": "apache_http_server", "product_id": "CSAFPID-1491761", "product_identification_helper": { "cpe": "cpe:2.3:a:apache_software_foundation:apache_http_server:2.4.55:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "apache_http_server", "product": { "name": "apache_http_server", "product_id": "CSAFPID-1491762", "product_identification_helper": { "cpe": "cpe:2.3:a:apache_software_foundation:apache_http_server:2.4.59:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "apache_software_foundation" }, { "branches": [ { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-76769", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-76761", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-76766", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139639", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-76770", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-76772", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139611", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139603", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139596", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.16:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139667", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.17:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139663", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.18:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139697", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.19:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-76762", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139591", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.20:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139684", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.21:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139652", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.22:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-96956", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.23:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139580", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139628", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.25:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139643", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.26:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139651", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.27:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139623", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.28:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139593", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.29:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-76764", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139704", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.30:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139647", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.31:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139728", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.32:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139724", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.33:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139584", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.34:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139696", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.35:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139685", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.36:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139677", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.37:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139585", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.38:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139577", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.39:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-76767", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139664", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.40:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139675", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.41:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139602", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.42:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139569", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.43:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139689", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.44:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139655", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.45:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139716", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.46:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139737", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.47:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139568", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.48:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139711", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.49:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139589", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139662", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.50:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139619", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.51:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139563", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.52:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139637", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.53:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-140516", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.54:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-142004", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.55:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-1473391", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.56:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-1473393", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.57:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-1473392", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.58:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-1491521", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.59:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-76765", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-76763", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-76771", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-76773", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "apache" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-36387", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-76769", "CSAFPID-76761", "CSAFPID-76762", "CSAFPID-76764", "CSAFPID-76767", "CSAFPID-76765", "CSAFPID-76763", "CSAFPID-76771", "CSAFPID-76773", "CSAFPID-76766", "CSAFPID-76770", "CSAFPID-139611", "CSAFPID-139596", "CSAFPID-139667", "CSAFPID-139663", "CSAFPID-139697", "CSAFPID-139591", "CSAFPID-139684", "CSAFPID-139652", "CSAFPID-96956", "CSAFPID-139580", "CSAFPID-139628", "CSAFPID-139643", "CSAFPID-139651", "CSAFPID-139623", "CSAFPID-139593", "CSAFPID-139704", "CSAFPID-139724", "CSAFPID-139584", "CSAFPID-139696", "CSAFPID-139677", "CSAFPID-139585", "CSAFPID-139737", "CSAFPID-139711", "CSAFPID-139662", "CSAFPID-139637", "CSAFPID-1491761", "CSAFPID-1491762" ] }, "references": [ { "category": "self", "summary": "CVE-2024-36387", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36387.json" } ], "title": "CVE-2024-36387" }, { "cve": "CVE-2024-38472", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "product_status": { "known_affected": [ "CSAFPID-76769", "CSAFPID-76761", "CSAFPID-76762", "CSAFPID-76764", "CSAFPID-76767", "CSAFPID-76765", "CSAFPID-76763", "CSAFPID-76771", "CSAFPID-76773", "CSAFPID-76766", "CSAFPID-76770", "CSAFPID-139611", "CSAFPID-139596", "CSAFPID-139667", "CSAFPID-139663", "CSAFPID-139697", "CSAFPID-139591", "CSAFPID-139684", "CSAFPID-139652", "CSAFPID-96956", "CSAFPID-139580", "CSAFPID-139628", "CSAFPID-139643", "CSAFPID-139651", "CSAFPID-139623", "CSAFPID-139593", "CSAFPID-139704", "CSAFPID-139724", "CSAFPID-139584", "CSAFPID-139696", "CSAFPID-139677", "CSAFPID-139585", "CSAFPID-139737", "CSAFPID-139711", "CSAFPID-139662", "CSAFPID-139637", "CSAFPID-1465466", "CSAFPID-1491762" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38472", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38472.json" } ], "title": "CVE-2024-38472" }, { "cve": "CVE-2024-38473", "cwe": { "id": "CWE-172", "name": "Encoding Error" }, "notes": [ { "category": "other", "text": "Encoding Error", "title": "CWE-172" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "product_status": { "known_affected": [ "CSAFPID-76769", "CSAFPID-76761", "CSAFPID-76762", "CSAFPID-76764", "CSAFPID-76767", "CSAFPID-76765", "CSAFPID-76763", "CSAFPID-76771", "CSAFPID-76773", "CSAFPID-76766", "CSAFPID-76770", "CSAFPID-139611", "CSAFPID-139596", "CSAFPID-139667", "CSAFPID-139663", "CSAFPID-139697", "CSAFPID-139591", "CSAFPID-139684", "CSAFPID-139652", "CSAFPID-96956", "CSAFPID-139580", "CSAFPID-139628", "CSAFPID-139643", "CSAFPID-139651", "CSAFPID-139623", "CSAFPID-139593", "CSAFPID-139704", "CSAFPID-139724", "CSAFPID-139584", "CSAFPID-139696", "CSAFPID-139677", "CSAFPID-139585", "CSAFPID-139737", "CSAFPID-139711", "CSAFPID-139662", "CSAFPID-139637", "CSAFPID-1465466", "CSAFPID-1491762" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38473", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38473.json" } ], "title": "CVE-2024-38473" }, { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-172", "name": "Encoding Error" }, "notes": [ { "category": "other", "text": "Encoding Error", "title": "CWE-172" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "product_status": { "known_affected": [ "CSAFPID-76769", "CSAFPID-76761", "CSAFPID-76762", "CSAFPID-76764", "CSAFPID-76767", "CSAFPID-76765", "CSAFPID-76763", "CSAFPID-76771", "CSAFPID-76773", "CSAFPID-76766", "CSAFPID-76770", "CSAFPID-139611", "CSAFPID-139596", "CSAFPID-139667", "CSAFPID-139663", "CSAFPID-139697", "CSAFPID-139591", "CSAFPID-139684", "CSAFPID-139652", "CSAFPID-96956", "CSAFPID-139580", "CSAFPID-139628", "CSAFPID-139643", "CSAFPID-139651", "CSAFPID-139623", "CSAFPID-139593", "CSAFPID-139704", "CSAFPID-139724", "CSAFPID-139584", "CSAFPID-139696", "CSAFPID-139677", "CSAFPID-139585", "CSAFPID-139737", "CSAFPID-139711", "CSAFPID-139662", "CSAFPID-139637", "CSAFPID-1465466", "CSAFPID-1491762" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38474", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38474.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-76769", "CSAFPID-76761", "CSAFPID-76762", "CSAFPID-76764", "CSAFPID-76767", "CSAFPID-76765", "CSAFPID-76763", "CSAFPID-76771", "CSAFPID-76773", "CSAFPID-76766", "CSAFPID-76770", "CSAFPID-139611", "CSAFPID-139596", "CSAFPID-139667", "CSAFPID-139663", "CSAFPID-139697", "CSAFPID-139591", "CSAFPID-139684", "CSAFPID-139652", "CSAFPID-96956", "CSAFPID-139580", "CSAFPID-139628", "CSAFPID-139643", "CSAFPID-139651", "CSAFPID-139623", "CSAFPID-139593", "CSAFPID-139704", "CSAFPID-139724", "CSAFPID-139584", "CSAFPID-139696", "CSAFPID-139677", "CSAFPID-139585", "CSAFPID-139737", "CSAFPID-139711", "CSAFPID-139662", "CSAFPID-139637", "CSAFPID-1465466", "CSAFPID-1491762" ] } ], "title": "CVE-2024-38474" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "product_status": { "known_affected": [ "CSAFPID-76769", "CSAFPID-76761", "CSAFPID-76762", "CSAFPID-76764", "CSAFPID-76767", "CSAFPID-76765", "CSAFPID-76763", "CSAFPID-76771", "CSAFPID-76773", "CSAFPID-76766", "CSAFPID-76770", "CSAFPID-139611", "CSAFPID-139596", "CSAFPID-139667", "CSAFPID-139663", "CSAFPID-139697", "CSAFPID-139591", "CSAFPID-139684", "CSAFPID-139652", "CSAFPID-96956", "CSAFPID-139580", "CSAFPID-139628", "CSAFPID-139643", "CSAFPID-139651", "CSAFPID-139623", "CSAFPID-139593", "CSAFPID-139704", "CSAFPID-139724", "CSAFPID-139584", "CSAFPID-139696", "CSAFPID-139677", "CSAFPID-139585", "CSAFPID-139737", "CSAFPID-139711", "CSAFPID-139662", "CSAFPID-139637", "CSAFPID-1465466", "CSAFPID-1491762" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38475", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-76769", "CSAFPID-76761", "CSAFPID-76762", "CSAFPID-76764", "CSAFPID-76767", "CSAFPID-76765", "CSAFPID-76763", "CSAFPID-76771", "CSAFPID-76773", "CSAFPID-76766", "CSAFPID-76770", "CSAFPID-139611", "CSAFPID-139596", "CSAFPID-139667", "CSAFPID-139663", "CSAFPID-139697", "CSAFPID-139591", "CSAFPID-139684", "CSAFPID-139652", "CSAFPID-96956", "CSAFPID-139580", "CSAFPID-139628", "CSAFPID-139643", "CSAFPID-139651", "CSAFPID-139623", "CSAFPID-139593", "CSAFPID-139704", "CSAFPID-139724", "CSAFPID-139584", "CSAFPID-139696", "CSAFPID-139677", "CSAFPID-139585", "CSAFPID-139737", "CSAFPID-139711", "CSAFPID-139662", "CSAFPID-139637", "CSAFPID-1465466", "CSAFPID-1491762" ] } ], "title": "CVE-2024-38475" }, { "cve": "CVE-2024-38476", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Inclusion of Functionality from Untrusted Control Sphere", "title": "CWE-829" } ], "product_status": { "known_affected": [ "CSAFPID-76769", "CSAFPID-76761", "CSAFPID-76762", "CSAFPID-76764", "CSAFPID-76767", "CSAFPID-76765", "CSAFPID-76763", "CSAFPID-76771", "CSAFPID-76773", "CSAFPID-76766", "CSAFPID-76770", "CSAFPID-139611", "CSAFPID-139596", "CSAFPID-139667", "CSAFPID-139663", "CSAFPID-139697", "CSAFPID-139591", "CSAFPID-139684", "CSAFPID-139652", "CSAFPID-96956", "CSAFPID-139580", "CSAFPID-139628", "CSAFPID-139643", "CSAFPID-139651", "CSAFPID-139623", "CSAFPID-139593", "CSAFPID-139704", "CSAFPID-139724", "CSAFPID-139584", "CSAFPID-139696", "CSAFPID-139677", "CSAFPID-139585", "CSAFPID-139737", "CSAFPID-139711", "CSAFPID-139662", "CSAFPID-139637", "CSAFPID-1465466", "CSAFPID-1491762" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38476", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38476.json" } ], "title": "CVE-2024-38476" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-76769", "CSAFPID-76761", "CSAFPID-76762", "CSAFPID-76764", "CSAFPID-76767", "CSAFPID-76765", "CSAFPID-76763", "CSAFPID-76771", "CSAFPID-76773", "CSAFPID-76766", "CSAFPID-76770", "CSAFPID-139611", "CSAFPID-139596", "CSAFPID-139667", "CSAFPID-139663", "CSAFPID-139697", "CSAFPID-139591", "CSAFPID-139684", "CSAFPID-139652", "CSAFPID-96956", "CSAFPID-139580", "CSAFPID-139628", "CSAFPID-139643", "CSAFPID-139651", "CSAFPID-139623", "CSAFPID-139593", "CSAFPID-139704", "CSAFPID-139724", "CSAFPID-139584", "CSAFPID-139696", "CSAFPID-139677", "CSAFPID-139585", "CSAFPID-139737", "CSAFPID-139711", "CSAFPID-139662", "CSAFPID-139637", "CSAFPID-1465466", "CSAFPID-1491762" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38477", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38477.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-76769", "CSAFPID-76761", "CSAFPID-76762", "CSAFPID-76764", "CSAFPID-76767", "CSAFPID-76765", "CSAFPID-76763", "CSAFPID-76771", "CSAFPID-76773", "CSAFPID-76766", "CSAFPID-76770", "CSAFPID-139611", "CSAFPID-139596", "CSAFPID-139667", "CSAFPID-139663", "CSAFPID-139697", "CSAFPID-139591", "CSAFPID-139684", "CSAFPID-139652", "CSAFPID-96956", "CSAFPID-139580", "CSAFPID-139628", "CSAFPID-139643", "CSAFPID-139651", "CSAFPID-139623", "CSAFPID-139593", "CSAFPID-139704", "CSAFPID-139724", "CSAFPID-139584", "CSAFPID-139696", "CSAFPID-139677", "CSAFPID-139585", "CSAFPID-139737", "CSAFPID-139711", "CSAFPID-139662", "CSAFPID-139637", "CSAFPID-1465466", "CSAFPID-1491762" ] } ], "title": "CVE-2024-38477" }, { "cve": "CVE-2024-39573", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-76769", "CSAFPID-76761", "CSAFPID-76762", "CSAFPID-76764", "CSAFPID-76767", "CSAFPID-76765", "CSAFPID-76763", "CSAFPID-76771", "CSAFPID-76773", "CSAFPID-76766", "CSAFPID-76770", "CSAFPID-139611", "CSAFPID-139596", "CSAFPID-139667", "CSAFPID-139663", "CSAFPID-139697", "CSAFPID-139591", "CSAFPID-139684", "CSAFPID-139652", "CSAFPID-96956", "CSAFPID-139580", "CSAFPID-139628", "CSAFPID-139643", "CSAFPID-139651", "CSAFPID-139623", "CSAFPID-139593", "CSAFPID-139704", "CSAFPID-139724", "CSAFPID-139584", "CSAFPID-139696", "CSAFPID-139677", "CSAFPID-139585", "CSAFPID-139737", "CSAFPID-139711", "CSAFPID-139662", "CSAFPID-139637", "CSAFPID-1465466", "CSAFPID-1491762" ] }, "references": [ { "category": "self", "summary": "CVE-2024-39573", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39573.json" } ], "title": "CVE-2024-39573" } ] }
ncsc-2025-0021
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Oracle heeft meerdere kwetsbaarheden verholpen in zijn Communicatieproducten, waaronder Oracle Communications Unified Assurance, Oracle Communications Cloud Native Core Network Function en Oracle Communications Order and Service Management.", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden stellen ongeauthenticeerde kwaadwillenden in staat om Denial of Service (DoS) aanvallen uit te voeren of om ongeautoriseerde toegang tot gevoelige gegevens te verkrijgen. Specifieke versies, zoals 24.2.0 en 24.3.0 van de Cloud Native Core Network Function, zijn bijzonder kwetsbaar. Kwaadwillenden kunnen deze kwetsbaarheden misbruiken door speciaal geprepareerde HTTP-verzoeken te sturen naar het kwetsbare systeem.", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Dependency on Vulnerable Third-Party Component", "title": "CWE-1395" }, { "category": "general", "text": "Always-Incorrect Control Flow Implementation", "title": "CWE-670" }, { "category": "general", "text": "Asymmetric Resource Consumption (Amplification)", "title": "CWE-405" }, { "category": "general", "text": "Path Traversal: \u0027.../...//\u0027", "title": "CWE-35" }, { "category": "general", "text": "Return of Pointer Value Outside of Expected Range", "title": "CWE-466" }, { "category": "general", "text": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)", "title": "CWE-338" }, { "category": "general", "text": "Use of Potentially Dangerous Function", "title": "CWE-676" }, { "category": "general", "text": "Unchecked Input for Loop Condition", "title": "CWE-606" }, { "category": "general", "text": "Multiple Interpretations of UI Input", "title": "CWE-450" }, { "category": "general", "text": "Incorrect Calculation of Buffer Size", "title": "CWE-131" }, { "category": "general", "text": "Use of Weak Hash", "title": "CWE-328" }, { "category": "general", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" }, { "category": "general", "text": "Incorrect Resource Transfer Between Spheres", "title": "CWE-669" }, { "category": "general", "text": "Insufficient Granularity of Access Control", "title": "CWE-1220" }, { "category": "general", "text": "Insertion of Sensitive Information Into Sent Data", "title": "CWE-201" }, { "category": "general", "text": "Acceptance of Extraneous Untrusted Data With Trusted Data", "title": "CWE-349" }, { "category": "general", "text": "Improper Handling of Exceptional Conditions", "title": "CWE-755" }, { "category": "general", "text": "Improper Verification of Cryptographic Signature", "title": "CWE-347" }, { "category": "general", "text": "Excessive Iteration", "title": "CWE-834" }, { "category": "general", "text": "Improper Handling of Case Sensitivity", "title": "CWE-178" }, { "category": "general", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" }, { "category": "general", "text": "Expected Behavior Violation", "title": "CWE-440" }, { "category": "general", "text": "Double Free", "title": "CWE-415" }, { "category": "general", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" }, { "category": "general", "text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel", "title": "CWE-924" }, { "category": "general", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" }, { "category": "general", "text": "Improper Check or Handling of Exceptional Conditions", "title": "CWE-703" }, { "category": "general", "text": "Reachable Assertion", "title": "CWE-617" }, { "category": "general", "text": "Uncontrolled Search Path Element", "title": "CWE-427" }, { "category": "general", "text": "Use of Password Hash Instead of Password for Authentication", "title": "CWE-836" }, { "category": "general", "text": "Integer Overflow to Buffer Overflow", "title": "CWE-680" }, { "category": "general", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" }, { "category": "general", "text": "Relative Path Traversal", "title": "CWE-23" }, { "category": "general", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" }, { "category": "general", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "general", "text": "Observable Discrepancy", "title": "CWE-203" }, { "category": "general", "text": "Improper Validation of Integrity Check Value", "title": "CWE-354" }, { "category": "general", "text": "Missing Cryptographic Step", "title": "CWE-325" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "User Interface (UI) Misrepresentation of Critical Information", "title": "CWE-451" }, { "category": "general", "text": "UNIX Symbolic Link (Symlink) Following", "title": "CWE-61" }, { "category": "general", "text": "Files or Directories Accessible to External Parties", "title": "CWE-552" }, { "category": "general", "text": "Authorization Bypass Through User-Controlled Key", "title": "CWE-639" }, { "category": "general", "text": "Use of Hard-coded Credentials", "title": "CWE-798" }, { "category": "general", "text": "Unrestricted Upload of File with Dangerous Type", "title": "CWE-434" }, { "category": "general", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" }, { "category": "general", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "Uncaught Exception", "title": "CWE-248" }, { "category": "general", "text": "Uncontrolled Recursion", "title": "CWE-674" }, { "category": "general", "text": "Incorrect Authorization", "title": "CWE-863" }, { "category": "general", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "general", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "general", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" }, { "category": "general", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "general", "text": "Improper Privilege Management", "title": "CWE-269" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Generation of Error Message Containing Sensitive Information", "title": "CWE-209" }, { "category": "general", "text": "Incorrect Default Permissions", "title": "CWE-276" }, { "category": "general", "text": "Authentication Bypass by Capture-replay", "title": "CWE-294" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; nvd; oracle", "url": "https://www.oracle.com/security-alerts/cpujan2025.html" } ], "title": "Kwetsbaarheden verholpen in Oracle Communications", "tracking": { "current_release_date": "2025-01-22T13:30:50.189632Z", "id": "NCSC-2025-0021", "initial_release_date": "2025-01-22T13:30:50.189632Z", "revision_history": [ { "date": "2025-01-22T13:30:50.189632Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1727475", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635313", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:10.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635305", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:12.11.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635311", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:12.11.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635312", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:12.11.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635323", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:12.6.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670430", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:14.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674632", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:14.0.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674630", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:14.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635320", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674633", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:17.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670439", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635322", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670429", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670435", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670431", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670436", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670432", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635321", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635310", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635318", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674640", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674642", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670434", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:24.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635316", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674639", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:24.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635314", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674638", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:24.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674637", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:24.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635306", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:4.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635307", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:4.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635317", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:46.6.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635319", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:46.6.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670438", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635324", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:5.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635315", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:5.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670433", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674641", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.0.1.10.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674635", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674636", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.1.1.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670437", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.1.1.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674631", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.1.1.9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674634", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.1.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635308", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635309", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications__10.4.0.4", "product": { "name": "communications__10.4.0.4", "product_id": "CSAFPID-1674629", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications__10.4.0.4:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___23.4.2", "product": { "name": "communications___23.4.2", "product_id": "CSAFPID-1670442", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___23.4.2:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___23.4.3", "product": { "name": "communications___23.4.3", "product_id": "CSAFPID-1635325", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___23.4.3:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___23.4.4", "product": { "name": "communications___23.4.4", "product_id": "CSAFPID-1635326", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___23.4.4:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___23.4.5", "product": { "name": "communications___23.4.5", "product_id": "CSAFPID-1674645", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___23.4.5:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___23.4.6", "product": { "name": "communications___23.4.6", "product_id": "CSAFPID-1674646", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___23.4.6:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___24.2.0", "product": { "name": "communications___24.2.0", "product_id": "CSAFPID-1674644", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___24.2.0:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___7.2.1.0.0", "product": { "name": "communications___7.2.1.0.0", "product_id": "CSAFPID-1670441", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___7.2.1.0.0:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___8.6.0.6", "product": { "name": "communications___8.6.0.6", "product_id": "CSAFPID-1635327", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___8.6.0.6:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___8.6.0.8", "product": { "name": "communications___8.6.0.8", "product_id": "CSAFPID-1635328", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___8.6.0.8:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___9.0.2", "product": { "name": "communications___9.0.2", "product_id": "CSAFPID-1670440", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___9.0.2:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___9.0.3", "product": { "name": "communications___9.0.3", "product_id": "CSAFPID-1635329", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___9.0.3:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___9.1.1.8.0", "product": { "name": "communications___9.1.1.8.0", "product_id": "CSAFPID-1674643", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___9.1.1.8.0:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1751386", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674621", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1751381", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:15.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1751383", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:15.0.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1751378", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:3.0.2.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1751377", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:3.0.3.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1751385", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:3.0.3.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674618", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:6.0.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674619", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:7.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674622", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:7.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1751384", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:7.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674617", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:7.4.3.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674623", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:7.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1751382", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:8.0.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1751380", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:8.1.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1751379", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:8.1.0.26:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674620", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications___12.0.6.0.0", "product": { "name": "communications_applications___12.0.6.0.0", "product_id": "CSAFPID-1674627", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications___12.0.6.0.0:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications___5.5.22", "product": { "name": "communications_applications___5.5.22", "product_id": "CSAFPID-1674626", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications___5.5.22:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications___6.0.3", "product": { "name": "communications_applications___6.0.3", "product_id": "CSAFPID-1674628", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications___6.0.3:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications___6.0.4", "product": { "name": "communications_applications___6.0.4", "product_id": "CSAFPID-1674624", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications___6.0.4:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications___6.0.5", "product": { "name": "communications_applications___6.0.5", "product_id": "CSAFPID-1674625", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications___6.0.5:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_asap", "product": { "name": "communications_asap", "product_id": "CSAFPID-816792", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_asap:7.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_billing_and_revenue_management", "product": { "name": "communications_billing_and_revenue_management", "product_id": "CSAFPID-764735", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_billing_and_revenue_management", "product": { "name": "communications_billing_and_revenue_management", "product_id": "CSAFPID-1751255", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_billing_and_revenue_management", "product": { "name": "communications_billing_and_revenue_management", "product_id": "CSAFPID-1751254", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0-15.0.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_billing_and_revenue_management", "product": { "name": "communications_billing_and_revenue_management", "product_id": "CSAFPID-816793", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_billing_and_revenue_management", "product": { "name": "communications_billing_and_revenue_management", "product_id": "CSAFPID-912557", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-764247", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-1650820", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-912556", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:15.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-1751303", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:15.0.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-220055", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-816765", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-816766", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-816767", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-1503577", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-1751300", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-764237", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-1650752", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-1673396", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-1751085", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-1751079", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_certificate_management", "product": { "name": "communications_cloud_native_core_certificate_management", "product_id": "CSAFPID-1673526", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_certificate_management", "product": { "name": "communications_cloud_native_core_certificate_management", "product_id": "CSAFPID-1673391", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_certificate_management", "product": { "name": "communications_cloud_native_core_certificate_management", "product_id": "CSAFPID-1673394", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_certificate_management", "product": { "name": "communications_cloud_native_core_certificate_management", "product_id": "CSAFPID-1751253", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-816768", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-816769", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-912085", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-1503578", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-1673389", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-1673390", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-1751090", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_dbtier", "product": { "name": "communications_cloud_native_core_dbtier", "product_id": "CSAFPID-1673421", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_dbtier", "product": { "name": "communications_cloud_native_core_dbtier", "product_id": "CSAFPID-1673420", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_dbtier", "product": { "name": "communications_cloud_native_core_dbtier", "product_id": "CSAFPID-1751246", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_data_analytics_function", "product": { "name": "communications_cloud_native_core_network_data_analytics_function", "product_id": "CSAFPID-816770", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_data_analytics_function", "product": { "name": "communications_cloud_native_core_network_data_analytics_function", "product_id": "CSAFPID-816771", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_data_analytics_function", "product": { "name": "communications_cloud_native_core_network_data_analytics_function", "product_id": "CSAFPID-912068", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_data_analytics_function", "product": { "name": "communications_cloud_native_core_network_data_analytics_function", "product_id": "CSAFPID-1503579", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-816772", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-912076", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-1503580", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-219838", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-611387", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-816773", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-912101", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-1503581", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-1751208", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-1751209", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-912539", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-912540", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-912541", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_installation___23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-912542", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_obserability_services_overlay___23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-912543", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_observability_services_overlay___23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-816774", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-816346", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-912077", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-1503322", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-1673413", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-1673415", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-1751231", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-816775", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-912544", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-816348", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-912545", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-816347", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-1673494", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-816776", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-816777", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-764240", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-1650751", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-1673517", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-1673395", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-912069", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-1751225", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0-24.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-1751088", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-1751089", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-94291", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-816778", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-614517", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-912547", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-1673392", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-1503582", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-1673393", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-1751081", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-1751084", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-912546", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:_automated_test_suite___23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-224795", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-912548", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-912102", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-912549", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-1503583", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-1503584", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-1503585", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-1672767", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-1751241", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-764826", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-90016", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-912078", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-816349", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-912550", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-1503586", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-1503587", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-1751238", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-1751240", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-1673399", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-1751239", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-1751080", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-1751082", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-816779", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:_signaling___23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_converged_application_server", "product": { "name": "communications_converged_application_server", "product_id": "CSAFPID-1751229", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_converged_application_server:8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_converged_application_server", "product": { "name": "communications_converged_application_server", "product_id": "CSAFPID-1751230", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_converged_application_server:8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_converged_charging_system", "product": { "name": "communications_converged_charging_system", "product_id": "CSAFPID-1503599", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_converged_charging_system", "product": { "name": "communications_converged_charging_system", "product_id": "CSAFPID-1503600", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergence", "product": { "name": "communications_convergence", "product_id": "CSAFPID-1751292", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.2.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergence", "product": { "name": "communications_convergence", "product_id": "CSAFPID-1751294", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergence", "product": { "name": "communications_convergence", "product_id": "CSAFPID-224793", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergence", "product": { "name": "communications_convergence", "product_id": "CSAFPID-1751295", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergence", "product": { "name": "communications_convergence", "product_id": "CSAFPID-816794", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergent_charging_controller", "product": { "name": "communications_convergent_charging_controller", "product_id": "CSAFPID-342793", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergent_charging_controller", "product": { "name": "communications_convergent_charging_controller", "product_id": "CSAFPID-1650777", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergent_charging_controller", "product": { "name": "communications_convergent_charging_controller", "product_id": "CSAFPID-1265", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergent_charging_controller", "product": { "name": "communications_convergent_charging_controller", "product_id": "CSAFPID-816350", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergent_charging_controller", "product": { "name": "communications_convergent_charging_controller", "product_id": "CSAFPID-1261", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:6.0.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_core_session_manager", "product": { "name": "communications_core_session_manager", "product_id": "CSAFPID-1672764", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_core_session_manager:9.1.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1503588", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1751104", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.3.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-40293", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1751242", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1751237", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0.0-9.0.2.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1751097", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-611413", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1751211", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-912551", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_patches___9.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-912552", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_platform___9.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_element_management_system", "product": { "name": "communications_eagle_element_management_system", "product_id": "CSAFPID-1503316", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_element_management_system", "product": { "name": "communications_eagle_element_management_system", "product_id": "CSAFPID-1503317", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_element_management_system", "product": { "name": "communications_eagle_element_management_system", "product_id": "CSAFPID-1751243", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:47.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-764242", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-819413", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-819414", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.2.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-816780", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.4.53:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_fraud_monitor", "product": { "name": "communications_fraud_monitor", "product_id": "CSAFPID-816781", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_fraud_monitor", "product": { "name": "communications_fraud_monitor", "product_id": "CSAFPID-816782", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_fraud_monitor", "product": { "name": "communications_fraud_monitor", "product_id": "CSAFPID-912553", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_instant_messaging_server", "product": { "name": "communications_instant_messaging_server", "product_id": "CSAFPID-219803", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_ip_service_activator", "product": { "name": "communications_ip_service_activator", "product_id": "CSAFPID-204622", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_ip_service_activator", "product": { "name": "communications_ip_service_activator", "product_id": "CSAFPID-219909", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_messaging_server", "product": { "name": "communications_messaging_server", "product_id": "CSAFPID-816351", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.24.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_messaging_server", "product": { "name": "communications_messaging_server", "product_id": "CSAFPID-1751218", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.26:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_metasolv_solution", "product": { "name": "communications_metasolv_solution", "product_id": "CSAFPID-611595", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816353", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.2.0.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816352", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.3.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-1503589", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-1503590", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-1673414", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816783", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.2.0.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816786", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.3.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816784", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.2.0.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816787", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.3.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816785", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.2.0.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816788", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.3.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_charging_and_control", "product": { "name": "communications_network_charging_and_control", "product_id": "CSAFPID-342803", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_charging_and_control", "product": { "name": "communications_network_charging_and_control", "product_id": "CSAFPID-1650778", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_charging_and_control", "product": { "name": "communications_network_charging_and_control", "product_id": "CSAFPID-1266", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_charging_and_control", "product": { "name": "communications_network_charging_and_control", "product_id": "CSAFPID-816354", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_charging_and_control", "product": { "name": "communications_network_charging_and_control", "product_id": "CSAFPID-204563", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_integrity", "product": { "name": "communications_network_integrity", "product_id": "CSAFPID-219776", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_offline_mediation_controller", "product": { "name": "communications_offline_mediation_controller", "product_id": "CSAFPID-765242", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_offline_mediation_controller", "product": { "name": "communications_offline_mediation_controller", "product_id": "CSAFPID-916906", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_offline_mediation_controller", "product": { "name": "communications_offline_mediation_controller", "product_id": "CSAFPID-1751247", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:15.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_offline_mediation_controller", "product": { "name": "communications_offline_mediation_controller", "product_id": "CSAFPID-1751248", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:15.0.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_operations_monitor", "product": { "name": "communications_operations_monitor", "product_id": "CSAFPID-93781", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_operations_monitor", "product": { "name": "communications_operations_monitor", "product_id": "CSAFPID-220132", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_operations_monitor", "product": { "name": "communications_operations_monitor", "product_id": "CSAFPID-912079", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_order_and_service_management", "product": { "name": "communications_order_and_service_management", "product_id": "CSAFPID-224790", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_order_and_service_management", "product": { "name": "communications_order_and_service_management", "product_id": "CSAFPID-221118", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_order_and_service_management", "product": { "name": "communications_order_and_service_management", "product_id": "CSAFPID-1673496", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_performance_intelligence", "product": { "name": "communications_performance_intelligence", "product_id": "CSAFPID-1503591", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_performance_intelligence:10.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_policy_management", "product": { "name": "communications_policy_management", "product_id": "CSAFPID-816789", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_policy_management", "product": { "name": "communications_policy_management", "product_id": "CSAFPID-816790", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_policy_management:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_pricing_design_center", "product": { "name": "communications_pricing_design_center", "product_id": "CSAFPID-764738", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_pricing_design_center", "product": { "name": "communications_pricing_design_center", "product_id": "CSAFPID-816355", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-1503601", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-816359", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.0.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-816358", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.1.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-816357", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.2.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-912558", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-1751233", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-1503602", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-1751234", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.1.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-816795", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.0.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-816796", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.1.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-816797", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.2.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-1503592", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-1503593", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-1672762", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-1503594", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-1503595", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-342804", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-819415", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-819416", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.2.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-816791", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.4.53:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-240600", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-1673382", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.0-5.5.22:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-1650731", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-1673530", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-1751235", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.1-6.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-1751296", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.4-6.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-764739", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-8984", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-204510", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-204569", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-219826", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-912073", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-1503596", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-1503597", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-1503598", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-1751217", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-912080", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-1673481", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-1751258", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_webrtc_session_controller", "product": { "name": "communications_webrtc_session_controller", "product_id": "CSAFPID-912554", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-41727", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1673530" ] }, "references": [ { "category": "self", "summary": "CVE-2022-41727", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41727.json" } ], "title": "CVE-2022-41727" }, { "cve": "CVE-2023-4408", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2023-4408", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4408.json" } ], "title": "CVE-2023-4408" }, { "cve": "CVE-2023-5678", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "other", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" }, { "category": "other", "text": "Missing Cryptographic Step", "title": "CWE-325" }, { "category": "other", "text": "Unchecked Input for Loop Condition", "title": "CWE-606" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-764237", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5678", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5678.json" } ], "title": "CVE-2023-5678" }, { "cve": "CVE-2023-5981", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "other", "text": "Observable Discrepancy", "title": "CWE-203" } ], "product_status": { "known_affected": [ "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1751217", "CSAFPID-1673481" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5981", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5981.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1751217", "CSAFPID-1673481" ] } ], "title": "CVE-2023-5981" }, { "cve": "CVE-2023-6597", "cwe": { "id": "CWE-61", "name": "UNIX Symbolic Link (Symlink) Following" }, "notes": [ { "category": "other", "text": "UNIX Symbolic Link (Symlink) Following", "title": "CWE-61" } ], "product_status": { "known_affected": [ "CSAFPID-1673395", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1751097" ] }, "references": [ { "category": "self", "summary": "CVE-2023-6597", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6597.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673395", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1751097" ] } ], "title": "CVE-2023-6597" }, { "cve": "CVE-2023-7256", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "other", "text": "Double Free", "title": "CWE-415" } ], "product_status": { "known_affected": [ "CSAFPID-220132", "CSAFPID-1751084", "CSAFPID-912079" ] }, "references": [ { "category": "self", "summary": "CVE-2023-7256", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-7256.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-220132", "CSAFPID-1751084", "CSAFPID-912079" ] } ], "title": "CVE-2023-7256" }, { "cve": "CVE-2023-29407", "cwe": { "id": "CWE-834", "name": "Excessive Iteration" }, "notes": [ { "category": "other", "text": "Excessive Iteration", "title": "CWE-834" } ], "product_status": { "known_affected": [ "CSAFPID-1673530" ] }, "references": [ { "category": "self", "summary": "CVE-2023-29407", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29407.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673530" ] } ], "title": "CVE-2023-29407" }, { "cve": "CVE-2023-29408", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2023-29408", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29408.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2023-29408" }, { "cve": "CVE-2023-40577", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-1751208", "CSAFPID-1751209" ] }, "references": [ { "category": "self", "summary": "CVE-2023-40577", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-40577.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1751208", "CSAFPID-1751209" ] } ], "title": "CVE-2023-40577" }, { "cve": "CVE-2023-46218", "cwe": { "id": "CWE-201", "name": "Insertion of Sensitive Information Into Sent Data" }, "notes": [ { "category": "other", "text": "Insertion of Sensitive Information Into Sent Data", "title": "CWE-201" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1751211" ] }, "references": [ { "category": "self", "summary": "CVE-2023-46218", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46218.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1751211" ] } ], "title": "CVE-2023-46218" }, { "cve": "CVE-2023-46219", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "other", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" } ], "product_status": { "known_affected": [ "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-912539", "CSAFPID-816773", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-614517", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912553", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-765242", "CSAFPID-912073", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1751211" ] }, "references": [ { "category": "self", "summary": "CVE-2023-46219", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46219.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-912539", "CSAFPID-816773", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-614517", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912553", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-765242", "CSAFPID-912073", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1751211" ] } ], "title": "CVE-2023-46219" }, { "cve": "CVE-2023-46604", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" } ], "product_status": { "known_affected": [ "CSAFPID-94291", "CSAFPID-40293", "CSAFPID-1265", "CSAFPID-1261", "CSAFPID-1266", "CSAFPID-8984", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-219826", "CSAFPID-204510", "CSAFPID-204563", "CSAFPID-204569", "CSAFPID-204622", "CSAFPID-219803", "CSAFPID-219838", "CSAFPID-219909", "CSAFPID-221118", "CSAFPID-224790", "CSAFPID-224793", "CSAFPID-240600", "CSAFPID-342793", "CSAFPID-342803", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-611595", "CSAFPID-614517", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764738", "CSAFPID-816346", "CSAFPID-816347", "CSAFPID-816348", "CSAFPID-816349", "CSAFPID-816350", "CSAFPID-816351", "CSAFPID-816352", "CSAFPID-816353", "CSAFPID-816354", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816776", "CSAFPID-816777", "CSAFPID-816778", "CSAFPID-816779", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816786", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-816794", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-1751104" ] }, "references": [ { "category": "self", "summary": "CVE-2023-46604", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46604.json" } ], "scores": [ { "cvss_v3": { "baseScore": 10.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-94291", "CSAFPID-40293", "CSAFPID-1265", "CSAFPID-1261", "CSAFPID-1266", "CSAFPID-8984", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-219826", "CSAFPID-204510", "CSAFPID-204563", "CSAFPID-204569", "CSAFPID-204622", "CSAFPID-219803", "CSAFPID-219838", "CSAFPID-219909", "CSAFPID-221118", "CSAFPID-224790", "CSAFPID-224793", "CSAFPID-240600", "CSAFPID-342793", "CSAFPID-342803", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-611595", "CSAFPID-614517", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764738", "CSAFPID-816346", "CSAFPID-816347", "CSAFPID-816348", "CSAFPID-816349", "CSAFPID-816350", "CSAFPID-816351", "CSAFPID-816352", "CSAFPID-816353", "CSAFPID-816354", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816776", "CSAFPID-816777", "CSAFPID-816778", "CSAFPID-816779", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816786", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-816794", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-1751104" ] } ], "title": "CVE-2023-46604" }, { "cve": "CVE-2023-50868", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2023-50868", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50868.json" } ], "title": "CVE-2023-50868" }, { "cve": "CVE-2024-0232", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1650777", "CSAFPID-1650778", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1751218", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0232", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0232.json" } ], "title": "CVE-2024-0232" }, { "cve": "CVE-2024-0397", "product_status": { "known_affected": [ "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673530" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0397", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0397.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673530" ] } ], "title": "CVE-2024-0397" }, { "cve": "CVE-2024-0450", "cwe": { "id": "CWE-450", "name": "Multiple Interpretations of UI Input" }, "notes": [ { "category": "other", "text": "Multiple Interpretations of UI Input", "title": "CWE-450" }, { "category": "other", "text": "Asymmetric Resource Consumption (Amplification)", "title": "CWE-405" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751097" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0450", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0450.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751097" ] } ], "title": "CVE-2024-0450" }, { "cve": "CVE-2024-1442", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "other", "text": "Improper Privilege Management", "title": "CWE-269" } ], "product_status": { "known_affected": [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-1442", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1442.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-1442" }, { "cve": "CVE-2024-2961", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1672762", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1673396", "CSAFPID-1673395", "CSAFPID-1673494", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751097", "CSAFPID-1751237" ] }, "references": [ { "category": "self", "summary": "CVE-2024-2961", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2961.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1672762", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1673396", "CSAFPID-1673395", "CSAFPID-1673494", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751097", "CSAFPID-1751237" ] } ], "title": "CVE-2024-2961" }, { "cve": "CVE-2024-3596", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "notes": [ { "category": "other", "text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel", "title": "CWE-924" }, { "category": "other", "text": "Use of Weak Hash", "title": "CWE-328" }, { "category": "other", "text": "Authentication Bypass by Capture-replay", "title": "CWE-294" }, { "category": "other", "text": "Use of Password Hash Instead of Password for Authentication", "title": "CWE-836" }, { "category": "other", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" }, { "category": "other", "text": "User Interface (UI) Misrepresentation of Critical Information", "title": "CWE-451" }, { "category": "other", "text": "Improper Validation of Integrity Check Value", "title": "CWE-354" } ], "product_status": { "known_affected": [ "CSAFPID-1751090", "CSAFPID-912079", "CSAFPID-220132", "CSAFPID-1751253" ] }, "references": [ { "category": "self", "summary": "CVE-2024-3596", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-3596.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751090", "CSAFPID-912079", "CSAFPID-220132", "CSAFPID-1751253" ] } ], "title": "CVE-2024-3596" }, { "cve": "CVE-2024-4030", "cwe": { "id": "CWE-276", "name": "Incorrect Default Permissions" }, "notes": [ { "category": "other", "text": "Incorrect Default Permissions", "title": "CWE-276" } ], "product_status": { "known_affected": [ "CSAFPID-1673530" ] }, "references": [ { "category": "self", "summary": "CVE-2024-4030", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4030.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673530" ] } ], "title": "CVE-2024-4030" }, { "cve": "CVE-2024-4032", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "notes": [ { "category": "other", "text": "Expected Behavior Violation", "title": "CWE-440" } ], "product_status": { "known_affected": [ "CSAFPID-1673530" ] }, "references": [ { "category": "self", "summary": "CVE-2024-4032", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4032.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673530" ] } ], "title": "CVE-2024-4032" }, { "cve": "CVE-2024-5535", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "other", "text": "Dependency on Vulnerable Third-Party Component", "title": "CWE-1395" } ], "product_status": { "known_affected": [ "CSAFPID-1751090", "CSAFPID-1751253" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5535", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751090", "CSAFPID-1751253" ] } ], "title": "CVE-2024-5535" }, { "cve": "CVE-2024-6119", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" } ], "product_status": { "known_affected": [ "CSAFPID-1751209" ] }, "references": [ { "category": "self", "summary": "CVE-2024-6119", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6119.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751209" ] } ], "title": "CVE-2024-6119" }, { "cve": "CVE-2024-6162", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673526", "CSAFPID-1673399", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751303", "CSAFPID-1650820", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-6162", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6162.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673526", "CSAFPID-1673399", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751303", "CSAFPID-1650820", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-6162" }, { "cve": "CVE-2024-6232", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "other", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" } ], "product_status": { "known_affected": [ "CSAFPID-1673530" ] }, "references": [ { "category": "self", "summary": "CVE-2024-6232", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673530" ] } ], "title": "CVE-2024-6232" }, { "cve": "CVE-2024-7254", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Uncontrolled Recursion", "title": "CWE-674" } ], "product_status": { "known_affected": [ "CSAFPID-912549", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673391", "CSAFPID-1673394", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751225", "CSAFPID-1751233", "CSAFPID-1673530", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-7254", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-912549", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673391", "CSAFPID-1673394", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751225", "CSAFPID-1751233", "CSAFPID-1673530", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-7254" }, { "cve": "CVE-2024-7592", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-7592", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-7592" }, { "cve": "CVE-2024-7885", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" } ], "product_status": { "known_affected": [ "CSAFPID-1673526", "CSAFPID-1673399", "CSAFPID-1751080", "CSAFPID-1751090", "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1672767", "CSAFPID-1751241", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751231" ] }, "references": [ { "category": "self", "summary": "CVE-2024-7885", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7885.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673526", "CSAFPID-1673399", "CSAFPID-1751080", "CSAFPID-1751090", "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1672767", "CSAFPID-1751241", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751231" ] } ], "title": "CVE-2024-7885" }, { "cve": "CVE-2024-8006", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-220132", "CSAFPID-1751084", "CSAFPID-912079" ] }, "references": [ { "category": "self", "summary": "CVE-2024-8006", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8006.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-220132", "CSAFPID-1751084", "CSAFPID-912079" ] } ], "title": "CVE-2024-8006" }, { "cve": "CVE-2024-9143", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1751253" ] }, "references": [ { "category": "self", "summary": "CVE-2024-9143", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-9143.json" } ], "title": "CVE-2024-9143" }, { "cve": "CVE-2024-22195", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-764237", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751081", "CSAFPID-1673393", "CSAFPID-1751085" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22195", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22195.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-764237", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751081", "CSAFPID-1673393", "CSAFPID-1751085" ] } ], "title": "CVE-2024-22195" }, { "cve": "CVE-2024-24786", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-24786", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24786.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-24786" }, { "cve": "CVE-2024-24791", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1751208", "CSAFPID-1751209" ] }, "references": [ { "category": "self", "summary": "CVE-2024-24791", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24791.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751208", "CSAFPID-1751209" ] } ], "title": "CVE-2024-24791" }, { "cve": "CVE-2024-25638", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "notes": [ { "category": "other", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "other", "text": "Acceptance of Extraneous Untrusted Data With Trusted Data", "title": "CWE-349" } ], "product_status": { "known_affected": [ "CSAFPID-912549", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751229", "CSAFPID-1751230", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751231" ] }, "references": [ { "category": "self", "summary": "CVE-2024-25638", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25638.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.9, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L", "version": "3.1" }, "products": [ "CSAFPID-912549", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751229", "CSAFPID-1751230", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751231" ] } ], "title": "CVE-2024-25638" }, { "cve": "CVE-2024-25710", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-912101", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-912102", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-342804", "CSAFPID-912080", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1727475", "CSAFPID-1751218" ] }, "references": [ { "category": "self", "summary": "CVE-2024-25710", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-912101", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-912102", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-342804", "CSAFPID-912080", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1727475", "CSAFPID-1751218" ] } ], "title": "CVE-2024-25710" }, { "cve": "CVE-2024-26308", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1727475", "CSAFPID-1751218", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-26308", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1727475", "CSAFPID-1751218", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-26308" }, { "cve": "CVE-2024-27309", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "other", "text": "Incorrect Authorization", "title": "CWE-863" } ], "product_status": { "known_affected": [ "CSAFPID-1751233", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27309", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27309.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1751233", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-27309" }, { "cve": "CVE-2024-28219", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "other", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" }, { "category": "other", "text": "Use of Potentially Dangerous Function", "title": "CWE-676" }, { "category": "other", "text": "Integer Overflow to Buffer Overflow", "title": "CWE-680" } ], "product_status": { "known_affected": [ "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1751085", "CSAFPID-912547" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28219", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28219.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1751085", "CSAFPID-912547" ] } ], "title": "CVE-2024-28219" }, { "cve": "CVE-2024-28834", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" } ], "product_status": { "known_affected": [ "CSAFPID-1673481", "CSAFPID-1751217", "CSAFPID-1503590" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28834", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28834.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673481", "CSAFPID-1751217", "CSAFPID-1503590" ] } ], "title": "CVE-2024-28834" }, { "cve": "CVE-2024-28835", "cwe": { "id": "CWE-248", "name": "Uncaught Exception" }, "notes": [ { "category": "other", "text": "Uncaught Exception", "title": "CWE-248" } ], "product_status": { "known_affected": [ "CSAFPID-1673481", "CSAFPID-1751217", "CSAFPID-1503590" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28835", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28835.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673481", "CSAFPID-1751217", "CSAFPID-1503590" ] } ], "title": "CVE-2024-28835" }, { "cve": "CVE-2024-28849", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673414", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751235", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28849", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673414", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751235", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-28849" }, { "cve": "CVE-2024-29025", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673494", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751233", "CSAFPID-1751218", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29025", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673494", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751233", "CSAFPID-1751218", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-29025" }, { "cve": "CVE-2024-29131", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1650820", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673530" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29131", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29131.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650820", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673530" ] } ], "title": "CVE-2024-29131" }, { "cve": "CVE-2024-29133", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1650820", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29133", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1650820", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-29133" }, { "cve": "CVE-2024-33599", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1751237" ] }, "references": [ { "category": "self", "summary": "CVE-2024-33599", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33599.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1751237" ] } ], "title": "CVE-2024-33599" }, { "cve": "CVE-2024-33600", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1751237" ] }, "references": [ { "category": "self", "summary": "CVE-2024-33600", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33600.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1751237" ] } ], "title": "CVE-2024-33600" }, { "cve": "CVE-2024-33601", "cwe": { "id": "CWE-703", "name": "Improper Check or Handling of Exceptional Conditions" }, "notes": [ { "category": "other", "text": "Improper Check or Handling of Exceptional Conditions", "title": "CWE-703" }, { "category": "other", "text": "Reachable Assertion", "title": "CWE-617" } ], "product_status": { "known_affected": [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1751237" ] }, "references": [ { "category": "self", "summary": "CVE-2024-33601", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33601.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1751237" ] } ], "title": "CVE-2024-33601" }, { "cve": "CVE-2024-33602", "cwe": { "id": "CWE-466", "name": "Return of Pointer Value Outside of Expected Range" }, "notes": [ { "category": "other", "text": "Return of Pointer Value Outside of Expected Range", "title": "CWE-466" }, { "category": "other", "text": "Improper Check or Handling of Exceptional Conditions", "title": "CWE-703" } ], "product_status": { "known_affected": [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751237" ] }, "references": [ { "category": "self", "summary": "CVE-2024-33602", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33602.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751237" ] } ], "title": "CVE-2024-33602" }, { "cve": "CVE-2024-34064", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751238", "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751081", "CSAFPID-1673393", "CSAFPID-1751239", "CSAFPID-1751082", "CSAFPID-1751240", "CSAFPID-1672767", "CSAFPID-1751241", "CSAFPID-1673481", "CSAFPID-1751085" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34064", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34064.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751238", "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751081", "CSAFPID-1673393", "CSAFPID-1751239", "CSAFPID-1751082", "CSAFPID-1751240", "CSAFPID-1672767", "CSAFPID-1751241", "CSAFPID-1673481", "CSAFPID-1751085" ] } ], "title": "CVE-2024-34064" }, { "cve": "CVE-2024-34750", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "other", "text": "Improper Handling of Exceptional Conditions", "title": "CWE-755" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1673481", "CSAFPID-1503596", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751242", "CSAFPID-1751243", "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1751085" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34750", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673481", "CSAFPID-1503596", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751242", "CSAFPID-1751243", "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1751085" ] } ], "title": "CVE-2024-34750" }, { "cve": "CVE-2024-35195", "cwe": { "id": "CWE-670", "name": "Always-Incorrect Control Flow Implementation" }, "notes": [ { "category": "other", "text": "Always-Incorrect Control Flow Implementation", "title": "CWE-670" } ], "product_status": { "known_affected": [ "CSAFPID-1751246", "CSAFPID-1751247", "CSAFPID-1751248", "CSAFPID-1673530", "CSAFPID-1673393", "CSAFPID-1751239", "CSAFPID-220132", "CSAFPID-1751082", "CSAFPID-1672767", "CSAFPID-1751241", "CSAFPID-912079", "CSAFPID-916906", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-35195", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1751246", "CSAFPID-1751247", "CSAFPID-1751248", "CSAFPID-1673530", "CSAFPID-1673393", "CSAFPID-1751239", "CSAFPID-220132", "CSAFPID-1751082", "CSAFPID-1672767", "CSAFPID-1751241", "CSAFPID-912079", "CSAFPID-916906", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-35195" }, { "cve": "CVE-2024-37370", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-912549", "CSAFPID-1673413", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1503590", "CSAFPID-1673393", "CSAFPID-1673395", "CSAFPID-1673399", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673392", "CSAFPID-1503589", "CSAFPID-1673415", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1751237", "CSAFPID-1751254", "CSAFPID-1751217", "CSAFPID-1673481", "CSAFPID-1751255" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37370", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-912549", "CSAFPID-1673413", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1503590", "CSAFPID-1673393", "CSAFPID-1673395", "CSAFPID-1673399", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673392", "CSAFPID-1503589", "CSAFPID-1673415", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1751237", "CSAFPID-1751254", "CSAFPID-1751217", "CSAFPID-1673481", "CSAFPID-1751255" ] } ], "title": "CVE-2024-37370" }, { "cve": "CVE-2024-37371", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-912549", "CSAFPID-1673413", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1503590", "CSAFPID-1673393", "CSAFPID-1673395", "CSAFPID-1673399", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673392", "CSAFPID-1503589", "CSAFPID-1673415", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751237", "CSAFPID-1751254", "CSAFPID-1751217", "CSAFPID-1673481", "CSAFPID-1751255", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37371", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-912549", "CSAFPID-1673413", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1503590", "CSAFPID-1673393", "CSAFPID-1673395", "CSAFPID-1673399", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673392", "CSAFPID-1503589", "CSAFPID-1673415", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751237", "CSAFPID-1751254", "CSAFPID-1751217", "CSAFPID-1673481", "CSAFPID-1751255", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-37371" }, { "cve": "CVE-2024-37891", "cwe": { "id": "CWE-669", "name": "Incorrect Resource Transfer Between Spheres" }, "notes": [ { "category": "other", "text": "Incorrect Resource Transfer Between Spheres", "title": "CWE-669" } ], "product_status": { "known_affected": [ "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751225", "CSAFPID-1751254", "CSAFPID-1673530", "CSAFPID-1751217", "CSAFPID-1751255", "CSAFPID-816790", "CSAFPID-1751258", "CSAFPID-1673481", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37891", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751225", "CSAFPID-1751254", "CSAFPID-1673530", "CSAFPID-1751217", "CSAFPID-1751255", "CSAFPID-816790", "CSAFPID-1751258", "CSAFPID-1673481", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-37891" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" }, { "category": "other", "text": "Path Traversal: \u0027.../...//\u0027", "title": "CWE-35" }, { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "other", "text": "Use of Hard-coded Credentials", "title": "CWE-798" }, { "category": "other", "text": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)", "title": "CWE-338" } ], "references": [ { "category": "self", "summary": "CVE-2024-38475", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json" } ], "title": "CVE-2024-38475" }, { "cve": "CVE-2024-38807", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "notes": [ { "category": "other", "text": "Improper Verification of Cryptographic Signature", "title": "CWE-347" } ], "product_status": { "known_affected": [ "CSAFPID-1751090", "CSAFPID-1751233", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38807", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38807.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1751090", "CSAFPID-1751233", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-38807" }, { "cve": "CVE-2024-38809", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "other", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" }, { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1673393" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38809", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38809.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-1673393" ] } ], "title": "CVE-2024-38809" }, { "cve": "CVE-2024-38816", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "other", "text": "Relative Path Traversal", "title": "CWE-23" } ], "product_status": { "known_affected": [ "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751081", "CSAFPID-1673393", "CSAFPID-1751079", "CSAFPID-1751080", "CSAFPID-1751084", "CSAFPID-1751085", "CSAFPID-1751082", "CSAFPID-1751225" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38816", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38816.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751081", "CSAFPID-1673393", "CSAFPID-1751079", "CSAFPID-1751080", "CSAFPID-1751084", "CSAFPID-1751085", "CSAFPID-1751082", "CSAFPID-1751225" ] } ], "title": "CVE-2024-38816" }, { "cve": "CVE-2024-38819", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" } ], "product_status": { "known_affected": [ "CSAFPID-1673393", "CSAFPID-1751079", "CSAFPID-1751080", "CSAFPID-1751081", "CSAFPID-1751082", "CSAFPID-1751084", "CSAFPID-1751085", "CSAFPID-1751225", "CSAFPID-1672767", "CSAFPID-1751241" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38819", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673393", "CSAFPID-1751079", "CSAFPID-1751080", "CSAFPID-1751081", "CSAFPID-1751082", "CSAFPID-1751084", "CSAFPID-1751085", "CSAFPID-1751225", "CSAFPID-1672767", "CSAFPID-1751241" ] } ], "title": "CVE-2024-38819" }, { "cve": "CVE-2024-38820", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "other", "text": "Improper Handling of Case Sensitivity", "title": "CWE-178" } ], "product_status": { "known_affected": [ "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751080", "CSAFPID-1751082", "CSAFPID-1751085", "CSAFPID-1672767", "CSAFPID-1751241" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38820", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38820.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751080", "CSAFPID-1751082", "CSAFPID-1751085", "CSAFPID-1672767", "CSAFPID-1751241" ] } ], "title": "CVE-2024-38820" }, { "cve": "CVE-2024-38827", "cwe": { "id": "CWE-639", "name": "Authorization Bypass Through User-Controlled Key" }, "notes": [ { "category": "other", "text": "Authorization Bypass Through User-Controlled Key", "title": "CWE-639" } ], "product_status": { "known_affected": [ "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38827", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38827.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-38827" }, { "cve": "CVE-2024-38998", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "notes": [ { "category": "other", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" } ], "product_status": { "known_affected": [ "CSAFPID-1751225", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-912073", "CSAFPID-1751254", "CSAFPID-1751079", "CSAFPID-1751242", "CSAFPID-1751234", "CSAFPID-1673496", "CSAFPID-1751233", "CSAFPID-1751255", "CSAFPID-1673481", "CSAFPID-1751085", "CSAFPID-220132", "CSAFPID-912079" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38998", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751225", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-912073", "CSAFPID-1751254", "CSAFPID-1751079", "CSAFPID-1751242", "CSAFPID-1751234", "CSAFPID-1673496", "CSAFPID-1751233", "CSAFPID-1751255", "CSAFPID-1673481", "CSAFPID-1751085", "CSAFPID-220132", "CSAFPID-912079" ] } ], "title": "CVE-2024-38998" }, { "cve": "CVE-2024-38999", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "notes": [ { "category": "other", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" } ], "product_status": { "known_affected": [ "CSAFPID-1751225", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-912073", "CSAFPID-1751254", "CSAFPID-1751079", "CSAFPID-1751242", "CSAFPID-1751234", "CSAFPID-1673496", "CSAFPID-1751233", "CSAFPID-1751255", "CSAFPID-1673481", "CSAFPID-1751085", "CSAFPID-220132", "CSAFPID-912079" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38999", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json" } ], "scores": [ { "cvss_v3": { "baseScore": 10.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751225", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-912073", "CSAFPID-1751254", "CSAFPID-1751079", "CSAFPID-1751242", "CSAFPID-1751234", "CSAFPID-1673496", "CSAFPID-1751233", "CSAFPID-1751255", "CSAFPID-1673481", "CSAFPID-1751085", "CSAFPID-220132", "CSAFPID-912079" ] } ], "title": "CVE-2024-38999" }, { "cve": "CVE-2024-41817", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "other", "text": "Uncontrolled Search Path Element", "title": "CWE-427" } ], "product_status": { "known_affected": [ "CSAFPID-1673382", "CSAFPID-1650731", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-220132", "CSAFPID-912079" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41817", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41817.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673382", "CSAFPID-1650731", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-220132", "CSAFPID-912079" ] } ], "title": "CVE-2024-41817" }, { "cve": "CVE-2024-45490", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "other", "text": "Incorrect Calculation of Buffer Size", "title": "CWE-131" }, { "category": "other", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" } ], "product_status": { "known_affected": [ "CSAFPID-1673382", "CSAFPID-1673399", "CSAFPID-1650731", "CSAFPID-1673517", "CSAFPID-1673396", "CSAFPID-1673414", "CSAFPID-1503590" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45490", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673382", "CSAFPID-1673399", "CSAFPID-1650731", "CSAFPID-1673517", "CSAFPID-1673396", "CSAFPID-1673414", "CSAFPID-1503590" ] } ], "title": "CVE-2024-45490" }, { "cve": "CVE-2024-45491", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1673382", "CSAFPID-1673399", "CSAFPID-1650731", "CSAFPID-1673517", "CSAFPID-1673396", "CSAFPID-1673414", "CSAFPID-1503590" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45491", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673382", "CSAFPID-1673399", "CSAFPID-1650731", "CSAFPID-1673517", "CSAFPID-1673396", "CSAFPID-1673414", "CSAFPID-1503590" ] } ], "title": "CVE-2024-45491" }, { "cve": "CVE-2024-45492", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1673382", "CSAFPID-1673399", "CSAFPID-1650731", "CSAFPID-1673517", "CSAFPID-1673396", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1673414", "CSAFPID-1503590" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45492", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673382", "CSAFPID-1673399", "CSAFPID-1650731", "CSAFPID-1673517", "CSAFPID-1673396", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1673414", "CSAFPID-1503590" ] } ], "title": "CVE-2024-45492" }, { "cve": "CVE-2024-47535", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1751233", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47535", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47535.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751233", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-47535" }, { "cve": "CVE-2024-47554", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1751292", "CSAFPID-1751234", "CSAFPID-1751294", "CSAFPID-1751233", "CSAFPID-1751295", "CSAFPID-1751296", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47554", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751292", "CSAFPID-1751234", "CSAFPID-1751294", "CSAFPID-1751233", "CSAFPID-1751295", "CSAFPID-1751296", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-47554" }, { "cve": "CVE-2024-47561", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" } ], "product_status": { "known_affected": [ "CSAFPID-1751296", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47561", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751296", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-47561" }, { "cve": "CVE-2024-47803", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "notes": [ { "category": "other", "text": "Generation of Error Message Containing Sensitive Information", "title": "CWE-209" } ], "product_status": { "known_affected": [ "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1672767", "CSAFPID-1751300", "CSAFPID-1751241", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47803", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47803.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1672767", "CSAFPID-1751300", "CSAFPID-1751241", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085" ] } ], "title": "CVE-2024-47803" }, { "cve": "CVE-2024-47804", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "notes": [ { "category": "other", "text": "Incorrect Authorization", "title": "CWE-863" }, { "category": "other", "text": "Insufficient Granularity of Access Control", "title": "CWE-1220" }, { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" } ], "product_status": { "known_affected": [ "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1672767", "CSAFPID-1751300", "CSAFPID-1751241", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47804", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47804.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1672767", "CSAFPID-1751300", "CSAFPID-1751241", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085" ] } ], "title": "CVE-2024-47804" }, { "cve": "CVE-2024-49766", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" } ], "product_status": { "known_affected": [ "CSAFPID-1751208", "CSAFPID-1751246", "CSAFPID-1751209" ] }, "references": [ { "category": "self", "summary": "CVE-2024-49766", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49766.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751208", "CSAFPID-1751246", "CSAFPID-1751209" ] } ], "title": "CVE-2024-49766" }, { "cve": "CVE-2024-49767", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1751208", "CSAFPID-1751080", "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1751082", "CSAFPID-1751300", "CSAFPID-1751246", "CSAFPID-1751209", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751231" ] }, "references": [ { "category": "self", "summary": "CVE-2024-49767", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49767.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751208", "CSAFPID-1751080", "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1751082", "CSAFPID-1751300", "CSAFPID-1751246", "CSAFPID-1751209", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751231" ] } ], "title": "CVE-2024-49767" }, { "cve": "CVE-2024-50379", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "notes": [ { "category": "other", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" } ], "product_status": { "known_affected": [ "CSAFPID-816790" ] }, "references": [ { "category": "self", "summary": "CVE-2024-50379", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50379.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816790" ] } ], "title": "CVE-2024-50379" }, { "cve": "CVE-2024-50602", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" } ], "product_status": { "known_affected": [ "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751082", "CSAFPID-1751085" ] }, "references": [ { "category": "self", "summary": "CVE-2024-50602", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50602.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751082", "CSAFPID-1751085" ] } ], "title": "CVE-2024-50602" }, { "cve": "CVE-2024-53677", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "other", "text": "Unrestricted Upload of File with Dangerous Type", "title": "CWE-434" }, { "category": "other", "text": "Files or Directories Accessible to External Parties", "title": "CWE-552" } ], "product_status": { "known_affected": [ "CSAFPID-816790" ] }, "references": [ { "category": "self", "summary": "CVE-2024-53677", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53677.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816790" ] } ], "title": "CVE-2024-53677" }, { "cve": "CVE-2024-54677", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-816790" ] }, "references": [ { "category": "self", "summary": "CVE-2024-54677", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54677.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816790" ] } ], "title": "CVE-2024-54677" }, { "cve": "CVE-2024-56337", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "notes": [ { "category": "other", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" } ], "product_status": { "known_affected": [ "CSAFPID-816790" ] }, "references": [ { "category": "self", "summary": "CVE-2024-56337", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816790" ] } ], "title": "CVE-2024-56337" }, { "cve": "CVE-2025-21542", "product_status": { "known_affected": [ "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21542", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21542.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2025-21542" }, { "cve": "CVE-2025-21544", "product_status": { "known_affected": [ "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21544", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21544.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2025-21544" }, { "cve": "CVE-2025-21554", "product_status": { "known_affected": [ "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21554", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21554.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2025-21554" } ] }
NCSC-2024-0464
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "SonicWall heeft kwetsbaarheden verholpen in de SMA100 SSLVPN (Specifiek voor firmware versies 10.2.1.13-72sv en eerder).", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden in de SonicWall SMA100 SSLVPN omvatten een heap-gebaseerde buffer overflow, een stack-gebaseerde buffer overflow, en een probleem met de certificaatvereiste tijdens authenticatie. Deze kwetsbaarheden kunnen door remote geauthenticeerde aanvallers worden misbruikt om willekeurige code uit te voeren op de getroffen systemen, wat kan leiden tot ongeautoriseerde toegang en controle over gevoelige gegevens. Daarnaast is er een zwakte in de pseudo-willekeurige getallengenerator (PRNG) die de integriteit van SSLVPN-verbindingen in gevaar kan brengen.", "title": "Interpretaties" }, { "category": "description", "text": "SonicWall heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)", "title": "CWE-338" }, { "category": "general", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" }, { "category": "general", "text": "Use of Hard-coded Credentials", "title": "CWE-798" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0018" } ], "title": "Kwetsbaarheden verholpen in SonicWall SMA100 SSLVPN", "tracking": { "current_release_date": "2024-12-06T11:48:08.461746Z", "id": "NCSC-2024-0464", "initial_release_date": "2024-12-06T11:48:08.461746Z", "revision_history": [ { "date": "2024-12-06T11:48:08.461746Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "sma100", "product": { "name": "sma100", "product_id": "CSAFPID-549085", "product_identification_helper": { "cpe": "cpe:2.3:a:sonicwall:sma100:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sma100", "product": { "name": "sma100", "product_id": "CSAFPID-1737326", "product_identification_helper": { "cpe": "cpe:2.3:a:sonicwall:sma100:10.2.1.13-72sv:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sma100_firmware", "product": { "name": "sma100_firmware", "product_id": "CSAFPID-1737602", "product_identification_helper": { "cpe": "cpe:2.3:o:sonicwall:sma100_firmware:*:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "sonicwall" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "references": [ { "category": "self", "summary": "CVE-2024-38475", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json" } ], "title": "CVE-2024-38475" }, { "cve": "CVE-2024-40763", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-549085", "CSAFPID-1737602" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40763", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40763.json" } ], "title": "CVE-2024-40763" }, { "cve": "CVE-2024-45318", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-549085", "CSAFPID-1737602" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45318", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45318.json" } ], "title": "CVE-2024-45318" }, { "cve": "CVE-2024-45319", "cwe": { "id": "CWE-798", "name": "Use of Hard-coded Credentials" }, "notes": [ { "category": "other", "text": "Use of Hard-coded Credentials", "title": "CWE-798" } ], "product_status": { "known_affected": [ "CSAFPID-549085" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45319", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45319.json" } ], "title": "CVE-2024-45319" }, { "cve": "CVE-2024-53702", "cwe": { "id": "CWE-338", "name": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)" }, "notes": [ { "category": "other", "text": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)", "title": "CWE-338" } ], "product_status": { "known_affected": [ "CSAFPID-549085", "CSAFPID-1737602" ] }, "references": [ { "category": "self", "summary": "CVE-2024-53702", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53702.json" } ], "title": "CVE-2024-53702" }, { "cve": "CVE-2024-53703", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-549085", "CSAFPID-1737602" ] }, "references": [ { "category": "self", "summary": "CVE-2024-53703", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53703.json" } ], "title": "CVE-2024-53703" } ] }
NCSC-2024-0275
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Apache Software Foundation heeft kwetsbaarheden verholpen in de Apache HTTP-Server.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken, middels een Server-Side-Request-Forgery (SSRF) verkeer te manipuleren, of om code uit te voeren binnen de webserver, waarvoor de kwaadwillende aanvankelijk niet is geautoriseerd.", "title": "Interpretaties" }, { "category": "description", "text": "Apache Software Foundation heeft updates uitgebracht om de kwetsbaarheden te verhelpen in Apache HTTP-Server 2.4.60. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" }, { "category": "general", "text": "Encoding Error", "title": "CWE-172" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Inclusion of Functionality from Untrusted Control Sphere", "title": "CWE-829" }, { "category": "general", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; ibm; nvd; redhat", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "title": "Kwetsbaarheden verholpen in Apache HHTP-server", "tracking": { "current_release_date": "2024-07-02T11:44:22.653047Z", "id": "NCSC-2024-0275", "initial_release_date": "2024-07-02T11:44:22.653047Z", "revision_history": [ { "date": "2024-07-02T11:44:22.653047Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "apache_http_server", "product": { "name": "apache_http_server", "product_id": "CSAFPID-1465466", "product_identification_helper": { "cpe": "cpe:2.3:a:apache_software_foundation:apache_http_server:2.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "apache_http_server", "product": { "name": "apache_http_server", "product_id": "CSAFPID-1491761", "product_identification_helper": { "cpe": "cpe:2.3:a:apache_software_foundation:apache_http_server:2.4.55:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "apache_http_server", "product": { "name": "apache_http_server", "product_id": "CSAFPID-1491762", "product_identification_helper": { "cpe": "cpe:2.3:a:apache_software_foundation:apache_http_server:2.4.59:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "apache_software_foundation" }, { "branches": [ { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-76769", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-76761", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-76766", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139639", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-76770", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-76772", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139611", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139603", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139596", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.16:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139667", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.17:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139663", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.18:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139697", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.19:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-76762", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139591", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.20:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139684", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.21:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139652", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.22:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-96956", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.23:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139580", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139628", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.25:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139643", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.26:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139651", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.27:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139623", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.28:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139593", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.29:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-76764", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139704", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.30:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139647", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.31:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139728", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.32:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139724", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.33:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139584", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.34:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139696", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.35:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139685", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.36:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139677", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.37:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139585", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.38:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139577", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.39:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-76767", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139664", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.40:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139675", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.41:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139602", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.42:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139569", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.43:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139689", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.44:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139655", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.45:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139716", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.46:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139737", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.47:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139568", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.48:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139711", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.49:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139589", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139662", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.50:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139619", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.51:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139563", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.52:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-139637", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.53:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-140516", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.54:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-142004", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.55:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-1473391", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.56:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-1473393", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.57:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-1473392", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.58:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-1491521", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.59:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-76765", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-76763", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-76771", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-76773", "product_identification_helper": { "cpe": "cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "apache" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-36387", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-76769", "CSAFPID-76761", "CSAFPID-76762", "CSAFPID-76764", "CSAFPID-76767", "CSAFPID-76765", "CSAFPID-76763", "CSAFPID-76771", "CSAFPID-76773", "CSAFPID-76766", "CSAFPID-76770", "CSAFPID-139611", "CSAFPID-139596", "CSAFPID-139667", "CSAFPID-139663", "CSAFPID-139697", "CSAFPID-139591", "CSAFPID-139684", "CSAFPID-139652", "CSAFPID-96956", "CSAFPID-139580", "CSAFPID-139628", "CSAFPID-139643", "CSAFPID-139651", "CSAFPID-139623", "CSAFPID-139593", "CSAFPID-139704", "CSAFPID-139724", "CSAFPID-139584", "CSAFPID-139696", "CSAFPID-139677", "CSAFPID-139585", "CSAFPID-139737", "CSAFPID-139711", "CSAFPID-139662", "CSAFPID-139637", "CSAFPID-1491761", "CSAFPID-1491762" ] }, "references": [ { "category": "self", "summary": "CVE-2024-36387", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36387.json" } ], "title": "CVE-2024-36387" }, { "cve": "CVE-2024-38472", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "product_status": { "known_affected": [ "CSAFPID-76769", "CSAFPID-76761", "CSAFPID-76762", "CSAFPID-76764", "CSAFPID-76767", "CSAFPID-76765", "CSAFPID-76763", "CSAFPID-76771", "CSAFPID-76773", "CSAFPID-76766", "CSAFPID-76770", "CSAFPID-139611", "CSAFPID-139596", "CSAFPID-139667", "CSAFPID-139663", "CSAFPID-139697", "CSAFPID-139591", "CSAFPID-139684", "CSAFPID-139652", "CSAFPID-96956", "CSAFPID-139580", "CSAFPID-139628", "CSAFPID-139643", "CSAFPID-139651", "CSAFPID-139623", "CSAFPID-139593", "CSAFPID-139704", "CSAFPID-139724", "CSAFPID-139584", "CSAFPID-139696", "CSAFPID-139677", "CSAFPID-139585", "CSAFPID-139737", "CSAFPID-139711", "CSAFPID-139662", "CSAFPID-139637", "CSAFPID-1465466", "CSAFPID-1491762" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38472", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38472.json" } ], "title": "CVE-2024-38472" }, { "cve": "CVE-2024-38473", "cwe": { "id": "CWE-172", "name": "Encoding Error" }, "notes": [ { "category": "other", "text": "Encoding Error", "title": "CWE-172" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "product_status": { "known_affected": [ "CSAFPID-76769", "CSAFPID-76761", "CSAFPID-76762", "CSAFPID-76764", "CSAFPID-76767", "CSAFPID-76765", "CSAFPID-76763", "CSAFPID-76771", "CSAFPID-76773", "CSAFPID-76766", "CSAFPID-76770", "CSAFPID-139611", "CSAFPID-139596", "CSAFPID-139667", "CSAFPID-139663", "CSAFPID-139697", "CSAFPID-139591", "CSAFPID-139684", "CSAFPID-139652", "CSAFPID-96956", "CSAFPID-139580", "CSAFPID-139628", "CSAFPID-139643", "CSAFPID-139651", "CSAFPID-139623", "CSAFPID-139593", "CSAFPID-139704", "CSAFPID-139724", "CSAFPID-139584", "CSAFPID-139696", "CSAFPID-139677", "CSAFPID-139585", "CSAFPID-139737", "CSAFPID-139711", "CSAFPID-139662", "CSAFPID-139637", "CSAFPID-1465466", "CSAFPID-1491762" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38473", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38473.json" } ], "title": "CVE-2024-38473" }, { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-172", "name": "Encoding Error" }, "notes": [ { "category": "other", "text": "Encoding Error", "title": "CWE-172" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "product_status": { "known_affected": [ "CSAFPID-76769", "CSAFPID-76761", "CSAFPID-76762", "CSAFPID-76764", "CSAFPID-76767", "CSAFPID-76765", "CSAFPID-76763", "CSAFPID-76771", "CSAFPID-76773", "CSAFPID-76766", "CSAFPID-76770", "CSAFPID-139611", "CSAFPID-139596", "CSAFPID-139667", "CSAFPID-139663", "CSAFPID-139697", "CSAFPID-139591", "CSAFPID-139684", "CSAFPID-139652", "CSAFPID-96956", "CSAFPID-139580", "CSAFPID-139628", "CSAFPID-139643", "CSAFPID-139651", "CSAFPID-139623", "CSAFPID-139593", "CSAFPID-139704", "CSAFPID-139724", "CSAFPID-139584", "CSAFPID-139696", "CSAFPID-139677", "CSAFPID-139585", "CSAFPID-139737", "CSAFPID-139711", "CSAFPID-139662", "CSAFPID-139637", "CSAFPID-1465466", "CSAFPID-1491762" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38474", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38474.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-76769", "CSAFPID-76761", "CSAFPID-76762", "CSAFPID-76764", "CSAFPID-76767", "CSAFPID-76765", "CSAFPID-76763", "CSAFPID-76771", "CSAFPID-76773", "CSAFPID-76766", "CSAFPID-76770", "CSAFPID-139611", "CSAFPID-139596", "CSAFPID-139667", "CSAFPID-139663", "CSAFPID-139697", "CSAFPID-139591", "CSAFPID-139684", "CSAFPID-139652", "CSAFPID-96956", "CSAFPID-139580", "CSAFPID-139628", "CSAFPID-139643", "CSAFPID-139651", "CSAFPID-139623", "CSAFPID-139593", "CSAFPID-139704", "CSAFPID-139724", "CSAFPID-139584", "CSAFPID-139696", "CSAFPID-139677", "CSAFPID-139585", "CSAFPID-139737", "CSAFPID-139711", "CSAFPID-139662", "CSAFPID-139637", "CSAFPID-1465466", "CSAFPID-1491762" ] } ], "title": "CVE-2024-38474" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "product_status": { "known_affected": [ "CSAFPID-76769", "CSAFPID-76761", "CSAFPID-76762", "CSAFPID-76764", "CSAFPID-76767", "CSAFPID-76765", "CSAFPID-76763", "CSAFPID-76771", "CSAFPID-76773", "CSAFPID-76766", "CSAFPID-76770", "CSAFPID-139611", "CSAFPID-139596", "CSAFPID-139667", "CSAFPID-139663", "CSAFPID-139697", "CSAFPID-139591", "CSAFPID-139684", "CSAFPID-139652", "CSAFPID-96956", "CSAFPID-139580", "CSAFPID-139628", "CSAFPID-139643", "CSAFPID-139651", "CSAFPID-139623", "CSAFPID-139593", "CSAFPID-139704", "CSAFPID-139724", "CSAFPID-139584", "CSAFPID-139696", "CSAFPID-139677", "CSAFPID-139585", "CSAFPID-139737", "CSAFPID-139711", "CSAFPID-139662", "CSAFPID-139637", "CSAFPID-1465466", "CSAFPID-1491762" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38475", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-76769", "CSAFPID-76761", "CSAFPID-76762", "CSAFPID-76764", "CSAFPID-76767", "CSAFPID-76765", "CSAFPID-76763", "CSAFPID-76771", "CSAFPID-76773", "CSAFPID-76766", "CSAFPID-76770", "CSAFPID-139611", "CSAFPID-139596", "CSAFPID-139667", "CSAFPID-139663", "CSAFPID-139697", "CSAFPID-139591", "CSAFPID-139684", "CSAFPID-139652", "CSAFPID-96956", "CSAFPID-139580", "CSAFPID-139628", "CSAFPID-139643", "CSAFPID-139651", "CSAFPID-139623", "CSAFPID-139593", "CSAFPID-139704", "CSAFPID-139724", "CSAFPID-139584", "CSAFPID-139696", "CSAFPID-139677", "CSAFPID-139585", "CSAFPID-139737", "CSAFPID-139711", "CSAFPID-139662", "CSAFPID-139637", "CSAFPID-1465466", "CSAFPID-1491762" ] } ], "title": "CVE-2024-38475" }, { "cve": "CVE-2024-38476", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Inclusion of Functionality from Untrusted Control Sphere", "title": "CWE-829" } ], "product_status": { "known_affected": [ "CSAFPID-76769", "CSAFPID-76761", "CSAFPID-76762", "CSAFPID-76764", "CSAFPID-76767", "CSAFPID-76765", "CSAFPID-76763", "CSAFPID-76771", "CSAFPID-76773", "CSAFPID-76766", "CSAFPID-76770", "CSAFPID-139611", "CSAFPID-139596", "CSAFPID-139667", "CSAFPID-139663", "CSAFPID-139697", "CSAFPID-139591", "CSAFPID-139684", "CSAFPID-139652", "CSAFPID-96956", "CSAFPID-139580", "CSAFPID-139628", "CSAFPID-139643", "CSAFPID-139651", "CSAFPID-139623", "CSAFPID-139593", "CSAFPID-139704", "CSAFPID-139724", "CSAFPID-139584", "CSAFPID-139696", "CSAFPID-139677", "CSAFPID-139585", "CSAFPID-139737", "CSAFPID-139711", "CSAFPID-139662", "CSAFPID-139637", "CSAFPID-1465466", "CSAFPID-1491762" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38476", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38476.json" } ], "title": "CVE-2024-38476" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-76769", "CSAFPID-76761", "CSAFPID-76762", "CSAFPID-76764", "CSAFPID-76767", "CSAFPID-76765", "CSAFPID-76763", "CSAFPID-76771", "CSAFPID-76773", "CSAFPID-76766", "CSAFPID-76770", "CSAFPID-139611", "CSAFPID-139596", "CSAFPID-139667", "CSAFPID-139663", "CSAFPID-139697", "CSAFPID-139591", "CSAFPID-139684", "CSAFPID-139652", "CSAFPID-96956", "CSAFPID-139580", "CSAFPID-139628", "CSAFPID-139643", "CSAFPID-139651", "CSAFPID-139623", "CSAFPID-139593", "CSAFPID-139704", "CSAFPID-139724", "CSAFPID-139584", "CSAFPID-139696", "CSAFPID-139677", "CSAFPID-139585", "CSAFPID-139737", "CSAFPID-139711", "CSAFPID-139662", "CSAFPID-139637", "CSAFPID-1465466", "CSAFPID-1491762" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38477", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38477.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-76769", "CSAFPID-76761", "CSAFPID-76762", "CSAFPID-76764", "CSAFPID-76767", "CSAFPID-76765", "CSAFPID-76763", "CSAFPID-76771", "CSAFPID-76773", "CSAFPID-76766", "CSAFPID-76770", "CSAFPID-139611", "CSAFPID-139596", "CSAFPID-139667", "CSAFPID-139663", "CSAFPID-139697", "CSAFPID-139591", "CSAFPID-139684", "CSAFPID-139652", "CSAFPID-96956", "CSAFPID-139580", "CSAFPID-139628", "CSAFPID-139643", "CSAFPID-139651", "CSAFPID-139623", "CSAFPID-139593", "CSAFPID-139704", "CSAFPID-139724", "CSAFPID-139584", "CSAFPID-139696", "CSAFPID-139677", "CSAFPID-139585", "CSAFPID-139737", "CSAFPID-139711", "CSAFPID-139662", "CSAFPID-139637", "CSAFPID-1465466", "CSAFPID-1491762" ] } ], "title": "CVE-2024-38477" }, { "cve": "CVE-2024-39573", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-76769", "CSAFPID-76761", "CSAFPID-76762", "CSAFPID-76764", "CSAFPID-76767", "CSAFPID-76765", "CSAFPID-76763", "CSAFPID-76771", "CSAFPID-76773", "CSAFPID-76766", "CSAFPID-76770", "CSAFPID-139611", "CSAFPID-139596", "CSAFPID-139667", "CSAFPID-139663", "CSAFPID-139697", "CSAFPID-139591", "CSAFPID-139684", "CSAFPID-139652", "CSAFPID-96956", "CSAFPID-139580", "CSAFPID-139628", "CSAFPID-139643", "CSAFPID-139651", "CSAFPID-139623", "CSAFPID-139593", "CSAFPID-139704", "CSAFPID-139724", "CSAFPID-139584", "CSAFPID-139696", "CSAFPID-139677", "CSAFPID-139585", "CSAFPID-139737", "CSAFPID-139711", "CSAFPID-139662", "CSAFPID-139637", "CSAFPID-1465466", "CSAFPID-1491762" ] }, "references": [ { "category": "self", "summary": "CVE-2024-39573", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39573.json" } ], "title": "CVE-2024-39573" } ] }
NCSC-2024-0411
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Oracle heeft kwetsbaarheden verholpen in diverse Database producten en subsystemen, zoals de Core database, Application Express, Autonomous Health Framework, Essbase, GoldenGate, SQL Developer en Secure Backup.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipuleren van data\n- Toegang tot gevoelige gegevens", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" }, { "category": "general", "text": "Observable Timing Discrepancy", "title": "CWE-208" }, { "category": "general", "text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)", "title": "CWE-776" }, { "category": "general", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" }, { "category": "general", "text": "Improper Handling of Exceptional Conditions", "title": "CWE-755" }, { "category": "general", "text": "Excessive Iteration", "title": "CWE-834" }, { "category": "general", "text": "Inefficient Algorithmic Complexity", "title": "CWE-407" }, { "category": "general", "text": "Improper Handling of Case Sensitivity", "title": "CWE-178" }, { "category": "general", "text": "Incorrect Permission Assignment for Critical Resource", "title": "CWE-732" }, { "category": "general", "text": "Double Free", "title": "CWE-415" }, { "category": "general", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" }, { "category": "general", "text": "Uncontrolled Search Path Element", "title": "CWE-427" }, { "category": "general", "text": "Encoding Error", "title": "CWE-172" }, { "category": "general", "text": "Integer Overflow to Buffer Overflow", "title": "CWE-680" }, { "category": "general", "text": "Untrusted Search Path", "title": "CWE-426" }, { "category": "general", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" }, { "category": "general", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" }, { "category": "general", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "general", "text": "Observable Discrepancy", "title": "CWE-203" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "Files or Directories Accessible to External Parties", "title": "CWE-552" }, { "category": "general", "text": "Authorization Bypass Through User-Controlled Key", "title": "CWE-639" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "CWE-275", "title": "CWE-275" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" }, { "category": "general", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "general", "text": "Exposure of Resource to Wrong Sphere", "title": "CWE-668" }, { "category": "general", "text": "Inclusion of Functionality from Untrusted Control Sphere", "title": "CWE-829" }, { "category": "general", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "general", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" }, { "category": "general", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "general", "text": "Improper Privilege Management", "title": "CWE-269" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Improper Neutralization of Alternate XSS Syntax", "title": "CWE-87" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" }, { "category": "general", "text": "CWE-18", "title": "CWE-18" }, { "category": "general", "text": "Covert Timing Channel", "title": "CWE-385" }, { "category": "general", "text": "Unchecked Input for Loop Condition", "title": "CWE-606" }, { "category": "general", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "general", "text": "Detection of Error Condition Without Action", "title": "CWE-390" }, { "category": "general", "text": "Improperly Controlled Sequential Memory Allocation", "title": "CWE-1325" }, { "category": "general", "text": "Truncation of Security-relevant Information", "title": "CWE-222" }, { "category": "general", "text": "Incorrect Calculation of Buffer Size", "title": "CWE-131" }, { "category": "general", "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "title": "CWE-59" }, { "category": "general", "text": "Missing Critical Step in Authentication", "title": "CWE-304" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; hkcert; nvd; oracle; redhat", "url": "https://www.oracle.com/security-alerts/cpuoct2024.html" } ], "title": "Kwetsbaarheden verholpen in Oracle Database producten", "tracking": { "current_release_date": "2024-10-17T13:15:19.595269Z", "id": "NCSC-2024-0411", "initial_release_date": "2024-10-17T13:15:19.595269Z", "revision_history": [ { "date": "2024-10-17T13:15:19.595269Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "database_-_grid", "product": { "name": "database_-_grid", "product_id": "CSAFPID-1673504", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_grid:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_grid", "product": { "name": "database_-_grid", "product_id": "CSAFPID-1673506", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_grid:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_core", "product": { "name": "database_-_core", "product_id": "CSAFPID-1673386", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_core:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_core", "product": { "name": "database_-_core", "product_id": "CSAFPID-1673385", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_core:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_core", "product": { "name": "database_-_core", "product_id": "CSAFPID-1673442", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_core:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_security", "product": { "name": "database_-_security", "product_id": "CSAFPID-1673507", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_security:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_security", "product": { "name": "database_-_security", "product_id": "CSAFPID-1673509", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_security:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_security", "product": { "name": "database_-_security", "product_id": "CSAFPID-1673508", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_security:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph_mapviewer", "product": { "name": "spatial_and_graph_mapviewer", "product_id": "CSAFPID-912561", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph_mapviewer:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph", "product": { "name": "spatial_and_graph", "product_id": "CSAFPID-764250", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph", "product": { "name": "spatial_and_graph", "product_id": "CSAFPID-1673511", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph", "product": { "name": "spatial_and_graph", "product_id": "CSAFPID-1673512", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph", "product": { "name": "spatial_and_graph", "product_id": "CSAFPID-816800", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph:23.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph", "product": { "name": "spatial_and_graph", "product_id": "CSAFPID-1673529", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fleet_patching_and_provisioning_-_micronaut", "product": { "name": "fleet_patching_and_provisioning_-_micronaut", "product_id": "CSAFPID-1673492", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:fleet_patching_and_provisioning_-_micronaut:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fleet_patching_and_provisioning", "product": { "name": "fleet_patching_and_provisioning", "product_id": "CSAFPID-1503603", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:fleet_patching_and_provisioning:23.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_xml_database", "product": { "name": "database_-_xml_database", "product_id": "CSAFPID-1673445", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_xml_database:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_xml_database", "product": { "name": "database_-_xml_database", "product_id": "CSAFPID-1673443", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_xml_database:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_xml_database", "product": { "name": "database_-_xml_database", "product_id": "CSAFPID-1673444", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_xml_database:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_java_vm", "product": { "name": "database_-_java_vm", "product_id": "CSAFPID-1673451", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_java_vm:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_java_vm", "product": { "name": "database_-_java_vm", "product_id": "CSAFPID-1673450", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_java_vm:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_java_vm", "product": { "name": "database_-_java_vm", "product_id": "CSAFPID-1673452", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_java_vm:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autonomous_health_framework", "product": { "name": "autonomous_health_framework", "product_id": "CSAFPID-816798", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autonomous_health_framework", "product": { "name": "autonomous_health_framework", "product_id": "CSAFPID-816799", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:23.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autonomous_health_framework", "product": { "name": "autonomous_health_framework", "product_id": "CSAFPID-1673525", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:prior_to_24.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-912046", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-1503299", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-816855", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-816361", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-912045", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-1503302", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-912044", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-1503306", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:22.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-816852", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition20.3.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-912600", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition20.3.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-816853", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition21.3.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-912601", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition21.3.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-816854", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition22.3.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sqlcl", "product": { "name": "sqlcl", "product_id": "CSAFPID-816801", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sqlcl:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sqlcl", "product": { "name": "sqlcl", "product_id": "CSAFPID-1673405", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sqlcl:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express_administration", "product": { "name": "application_express_administration", "product_id": "CSAFPID-764731", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express_administration:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express_customers_plugin", "product": { "name": "application_express_customers_plugin", "product_id": "CSAFPID-764732", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express_customers_plugin:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express_team_calendar_plugin", "product": { "name": "application_express_team_calendar_plugin", "product_id": "CSAFPID-764733", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express_team_calendar_plugin:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express", "product": { "name": "application_express", "product_id": "CSAFPID-266119", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express", "product": { "name": "application_express", "product_id": "CSAFPID-1673510", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express:23.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express", "product": { "name": "application_express", "product_id": "CSAFPID-1503575", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express:23.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express", "product": { "name": "application_express", "product_id": "CSAFPID-1673188", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express:24.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autonomous_health_framework", "product": { "name": "autonomous_health_framework", "product_id": "CSAFPID-765238", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:19c:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autonomous_health_framework", "product": { "name": "autonomous_health_framework", "product_id": "CSAFPID-765239", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:21c:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "blockchain_platform", "product": { "name": "blockchain_platform", "product_id": "CSAFPID-764779", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "blockchain_platform", "product": { "name": "blockchain_platform", "product_id": "CSAFPID-89587", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:blockchain_platform:21.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-765259", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:_security_and_provisioning___21.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-187448", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-94075", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-220886", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.4.3.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-611394", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.5.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-816317", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.5.3.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-912567", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.5.4.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-1503612", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.5.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-1673479", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_essbase", "product": { "name": "oracle_essbase", "product_id": "CSAFPID-1650506", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_essbase:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-816845", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-1650825", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.18:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-1673404", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-1650831", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:21.3-21.14.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data", "product": { "name": "goldengate_big_data", "product_id": "CSAFPID-764274", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_stream_analytics", "product": { "name": "goldengate_stream_analytics", "product_id": "CSAFPID-764752", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_stream_analytics", "product": { "name": "goldengate_stream_analytics", "product_id": "CSAFPID-1673384", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.0-19.1.0.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_stream_analytics", "product": { "name": "goldengate_stream_analytics", "product_id": "CSAFPID-220192", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_stream_analytics", "product": { "name": "goldengate_stream_analytics", "product_id": "CSAFPID-220193", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_studio", "product": { "name": "goldengate_studio", "product_id": "CSAFPID-816846", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_studio:12.2.0.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_studio", "product": { "name": "goldengate_studio", "product_id": "CSAFPID-611390", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_studio:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_studio", "product": { "name": "goldengate_studio", "product_id": "CSAFPID-764803", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_studio:fusion_middleware_12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_veridata", "product": { "name": "goldengate_veridata", "product_id": "CSAFPID-764275", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_veridata:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-342816", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1650767", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0-19.23.0.0.240716:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-485902", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1503736", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:19.23.0.0.240716:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-219912", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:19c:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1503739", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:21.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1650765", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:21.3-21.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1503738", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:21.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_goldengate_stream_analytics", "product": { "name": "oracle_goldengate_stream_analytics", "product_id": "CSAFPID-1650515", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_goldengate_stream_analytics:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "management_pack_for__goldengate", "product": { "name": "management_pack_for__goldengate", "product_id": "CSAFPID-764861", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:management_pack_for__goldengate:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "management_pack_for__goldengate", "product": { "name": "management_pack_for__goldengate", "product_id": "CSAFPID-1503640", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:management_pack_for__goldengate:12.2.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_goldengate_studio", "product": { "name": "oracle_goldengate_studio", "product_id": "CSAFPID-1650835", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_goldengate_studio:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_goldengate", "product": { "name": "oracle_goldengate", "product_id": "CSAFPID-1650575", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_goldengate:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-764813", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1503661", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:1.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1503663", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:1.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673497", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:1.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-764764", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:19.5.33:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-764765", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:20.3.28:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673491", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:20.3.40:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-764766", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:21.2.55:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673495", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:21.2.71:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-764767", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:22.3.26:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673493", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:22.3.45:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673489", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:23.3.33:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673488", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:24.1.17:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1650757", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_19.5.42:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1650758", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_20.3.40:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1650761", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_21.2.27:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1650760", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_22.3.46:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1650759", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_23.3.32:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_nosql_database", "product": { "name": "oracle_nosql_database", "product_id": "CSAFPID-1650584", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_nosql_database:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_secure_backup", "product": { "name": "oracle_secure_backup", "product_id": "CSAFPID-1650563", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_secure_backup:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-667692", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-345049", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-611417", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-1673422", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:19.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_sql_developer", "product": { "name": "oracle_sql_developer", "product_id": "CSAFPID-1650638", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_sql_developer:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sql_developer", "product": { "name": "sql_developer", "product_id": "CSAFPID-764822", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sql_developer:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sql_developer", "product": { "name": "sql_developer", "product_id": "CSAFPID-220643", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sql_developer:21.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sql_developer", "product": { "name": "sql_developer", "product_id": "CSAFPID-816870", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sql_developer:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sql_developer", "product": { "name": "sql_developer", "product_id": "CSAFPID-816871", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sql_developer:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sql_developer", "product": { "name": "sql_developer", "product_id": "CSAFPID-1673397", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sql_developer:24.3.0:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle" }, { "branches": [ { "category": "product_name", "name": "oracle_application_express", "product": { "name": "oracle_application_express", "product_id": "CSAFPID-1673144", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle_corporation:oracle_application_express:24.1:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle_corporation" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1471", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-220886", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764822", "CSAFPID-1650515", "CSAFPID-1650638", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-89587", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044" ] }, "references": [ { "category": "self", "summary": "CVE-2022-1471", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-1471.json" } ], "title": "CVE-2022-1471" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "notes": [ { "category": "other", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "other", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" } ], "product_status": { "known_affected": [ "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-342816", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-764752", "CSAFPID-764275", "CSAFPID-764861", "CSAFPID-266119", "CSAFPID-187448", "CSAFPID-219912", "CSAFPID-765238", "CSAFPID-765239", "CSAFPID-765259", "CSAFPID-667692", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-764250", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2022-34169", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-34169.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-342816", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-764752", "CSAFPID-764275", "CSAFPID-764861", "CSAFPID-266119", "CSAFPID-187448", "CSAFPID-219912", "CSAFPID-765238", "CSAFPID-765239", "CSAFPID-765259", "CSAFPID-667692", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-764250", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2022-34169" }, { "cve": "CVE-2022-36033", "cwe": { "id": "CWE-87", "name": "Improper Neutralization of Alternate XSS Syntax" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Alternate XSS Syntax", "title": "CWE-87" }, { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-220886", "CSAFPID-94075", "CSAFPID-764803", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764861", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-266119", "CSAFPID-187448", "CSAFPID-1650515", "CSAFPID-1650835", "CSAFPID-219912", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-667692", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-1503575", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-912567", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2022-36033", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36033.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-220886", "CSAFPID-94075", "CSAFPID-764803", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764861", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-266119", "CSAFPID-187448", "CSAFPID-1650515", "CSAFPID-1650835", "CSAFPID-219912", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-667692", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-1503575", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-912567", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2022-36033" }, { "cve": "CVE-2022-37454", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "other", "text": "Integer Overflow to Buffer Overflow", "title": "CWE-680" } ], "product_status": { "known_affected": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-1650563", "CSAFPID-89587", "CSAFPID-764861" ] }, "references": [ { "category": "self", "summary": "CVE-2022-37454", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-37454.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-1650563", "CSAFPID-89587", "CSAFPID-764861" ] } ], "title": "CVE-2022-37454" }, { "cve": "CVE-2022-38136", "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2022-38136", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-38136.json" } ], "title": "CVE-2022-38136" }, { "cve": "CVE-2022-40196", "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2022-40196", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-40196.json" } ], "title": "CVE-2022-40196" }, { "cve": "CVE-2022-41342", "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2022-41342", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41342.json" } ], "title": "CVE-2022-41342" }, { "cve": "CVE-2022-42919", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "other", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" }, { "category": "other", "text": "Improper Privilege Management", "title": "CWE-269" } ], "product_status": { "known_affected": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2022-42919", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42919.json" } ], "title": "CVE-2022-42919" }, { "cve": "CVE-2022-45061", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Inefficient Algorithmic Complexity", "title": "CWE-407" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2022-45061", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-45061.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-89587" ] } ], "title": "CVE-2022-45061" }, { "cve": "CVE-2022-46337", "product_status": { "known_affected": [ "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-764752", "CSAFPID-764275", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-764250", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-342816", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-816361", "CSAFPID-764813", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692" ] }, "references": [ { "category": "self", "summary": "CVE-2022-46337", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-46337.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-764752", "CSAFPID-764275", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-764250", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-342816", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-816361", "CSAFPID-764813", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692" ] } ], "title": "CVE-2022-46337" }, { "cve": "CVE-2023-2976", "cwe": { "id": "CWE-552", "name": "Files or Directories Accessible to External Parties" }, "notes": [ { "category": "other", "text": "Files or Directories Accessible to External Parties", "title": "CWE-552" } ], "product_status": { "known_affected": [ "CSAFPID-1650584", "CSAFPID-1650835", "CSAFPID-1650506", "CSAFPID-1650515", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-342816", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-764813", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692", "CSAFPID-89587", "CSAFPID-1673397", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-345049", "CSAFPID-816801", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-611417", "CSAFPID-764250", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-2976", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2976.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1650584", "CSAFPID-1650835", "CSAFPID-1650506", "CSAFPID-1650515", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-342816", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-764813", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692", "CSAFPID-89587", "CSAFPID-1673397", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-345049", "CSAFPID-816801", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-611417", "CSAFPID-764250", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-2976" }, { "cve": "CVE-2023-4043", "cwe": { "id": "CWE-834", "name": "Excessive Iteration" }, "notes": [ { "category": "other", "text": "Excessive Iteration", "title": "CWE-834" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1673405", "CSAFPID-1673397", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-4043", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4043.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673405", "CSAFPID-1673397", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-4043" }, { "cve": "CVE-2023-4759", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "other", "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "title": "CWE-59" }, { "category": "other", "text": "Improper Handling of Case Sensitivity", "title": "CWE-178" } ], "product_status": { "known_affected": [ "CSAFPID-1673397", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2023-4759", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4759.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673397", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2023-4759" }, { "cve": "CVE-2023-4863", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-342816", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801" ] }, "references": [ { "category": "self", "summary": "CVE-2023-4863", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4863.json" } ], "title": "CVE-2023-4863" }, { "cve": "CVE-2023-5072", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1650575", "CSAFPID-1650515", "CSAFPID-1650835", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5072", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5072.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650575", "CSAFPID-1650515", "CSAFPID-1650835", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-5072" }, { "cve": "CVE-2023-26031", "cwe": { "id": "CWE-426", "name": "Untrusted Search Path" }, "notes": [ { "category": "other", "text": "Untrusted Search Path", "title": "CWE-426" } ], "product_status": { "known_affected": [ "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26031", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26031.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2023-26031" }, { "cve": "CVE-2023-26551", "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26551", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26551.json" } ], "scores": [ { "cvss_v3": { "baseScore": 0.0, "baseSeverity": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-26551" }, { "cve": "CVE-2023-26552", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26552", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26552.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-26552" }, { "cve": "CVE-2023-26553", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26553", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26553.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-26553" }, { "cve": "CVE-2023-26554", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26554", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26554.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-26554" }, { "cve": "CVE-2023-26555", "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26555", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26555.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-26555" }, { "cve": "CVE-2023-28484", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-764250", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-816317", "CSAFPID-764813", "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-345049", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-611417", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-667692", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] }, "references": [ { "category": "self", "summary": "CVE-2023-28484", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28484.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-764250", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-816317", "CSAFPID-764813", "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-345049", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-611417", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-667692", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] } ], "title": "CVE-2023-28484" }, { "cve": "CVE-2023-29469", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Double Free", "title": "CWE-415" } ], "product_status": { "known_affected": [ "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-816317", "CSAFPID-89587", "CSAFPID-220886", "CSAFPID-342816", "CSAFPID-345049", "CSAFPID-764752", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-667692", "CSAFPID-764813", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764250", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] }, "references": [ { "category": "self", "summary": "CVE-2023-29469", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29469.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-816317", "CSAFPID-89587", "CSAFPID-220886", "CSAFPID-342816", "CSAFPID-345049", "CSAFPID-764752", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-667692", "CSAFPID-764813", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764250", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] } ], "title": "CVE-2023-29469" }, { "cve": "CVE-2023-33201", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-1650584", "CSAFPID-1673397", "CSAFPID-912561", "CSAFPID-345049", "CSAFPID-611390", "CSAFPID-611417", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-33201", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33201.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-1650584", "CSAFPID-1673397", "CSAFPID-912561", "CSAFPID-345049", "CSAFPID-611390", "CSAFPID-611417", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-33201" }, { "cve": "CVE-2023-37920", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "other", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "other", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612" ] }, "references": [ { "category": "self", "summary": "CVE-2023-37920", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-37920.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612" ] } ], "title": "CVE-2023-37920" }, { "cve": "CVE-2023-39410", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1673404", "CSAFPID-1673384", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] }, "references": [ { "category": "self", "summary": "CVE-2023-39410", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39410.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673404", "CSAFPID-1673384", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] } ], "title": "CVE-2023-39410" }, { "cve": "CVE-2023-44487", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1650757", "CSAFPID-1650758", "CSAFPID-1650759", "CSAFPID-1650760", "CSAFPID-1650761", "CSAFPID-89587", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503603", "CSAFPID-1503575", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-44487", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650757", "CSAFPID-1650758", "CSAFPID-1650759", "CSAFPID-1650760", "CSAFPID-1650761", "CSAFPID-89587", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503603", "CSAFPID-1503575", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-44487" }, { "cve": "CVE-2023-44981", "cwe": { "id": "CWE-639", "name": "Authorization Bypass Through User-Controlled Key" }, "notes": [ { "category": "other", "text": "Authorization Bypass Through User-Controlled Key", "title": "CWE-639" } ], "product_status": { "known_affected": [ "CSAFPID-1650515", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601" ] }, "references": [ { "category": "self", "summary": "CVE-2023-44981", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44981.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1650515", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601" ] } ], "title": "CVE-2023-44981" }, { "cve": "CVE-2023-45288", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-45288", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45288.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-45288" }, { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-222", "name": "Truncation of Security-relevant Information" }, "notes": [ { "category": "other", "text": "Truncation of Security-relevant Information", "title": "CWE-222" } ], "product_status": { "known_affected": [ "CSAFPID-1650765", "CSAFPID-1650757", "CSAFPID-1650758", "CSAFPID-1650767", "CSAFPID-1650759", "CSAFPID-1650760", "CSAFPID-1650761", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503575", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-48795", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1650765", "CSAFPID-1650757", "CSAFPID-1650758", "CSAFPID-1650767", "CSAFPID-1650759", "CSAFPID-1650760", "CSAFPID-1650761", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503575", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-48795" }, { "cve": "CVE-2023-49083", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2023-49083", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49083.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2023-49083" }, { "cve": "CVE-2023-51384", "cwe": { "id": "CWE-304", "name": "Missing Critical Step in Authentication" }, "notes": [ { "category": "other", "text": "Missing Critical Step in Authentication", "title": "CWE-304" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-51384", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51384.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-51384" }, { "cve": "CVE-2023-51385", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-51385", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51385.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-51385" }, { "cve": "CVE-2023-52425", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2023-52425", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52425.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2023-52425" }, { "cve": "CVE-2023-52426", "cwe": { "id": "CWE-776", "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)" }, "notes": [ { "category": "other", "text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)", "title": "CWE-776" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2023-52426", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52426.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2023-52426" }, { "cve": "CVE-2024-1874", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-1874", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1874.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-1874" }, { "cve": "CVE-2024-2408", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "other", "text": "Observable Discrepancy", "title": "CWE-203" }, { "category": "other", "text": "Observable Timing Discrepancy", "title": "CWE-208" }, { "category": "other", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" }, { "category": "other", "text": "Covert Timing Channel", "title": "CWE-385" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-2408", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2408.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-2408" }, { "cve": "CVE-2024-2511", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improperly Controlled Sequential Memory Allocation", "title": "CWE-1325" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-2511", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2511.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-2511" }, { "cve": "CVE-2024-4577", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" }, { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-4577", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4577.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-4577" }, { "cve": "CVE-2024-4603", "cwe": { "id": "CWE-606", "name": "Unchecked Input for Loop Condition" }, "notes": [ { "category": "other", "text": "Unchecked Input for Loop Condition", "title": "CWE-606" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-4603", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4603.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-4603" }, { "cve": "CVE-2024-4741", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-4741", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4741.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-4741" }, { "cve": "CVE-2024-5458", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5458", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5458.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-5458" }, { "cve": "CVE-2024-5535", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" } ], "product_status": { "known_affected": [ "CSAFPID-1673508", "CSAFPID-1673525" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5535", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673508", "CSAFPID-1673525" ] } ], "title": "CVE-2024-5535" }, { "cve": "CVE-2024-5585", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "notes": [ { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" }, { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "other", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5585", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5585.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-5585" }, { "cve": "CVE-2024-6119", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" } ], "product_status": { "known_affected": [ "CSAFPID-1673508", "CSAFPID-1673525" ] }, "references": [ { "category": "self", "summary": "CVE-2024-6119", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6119.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673508", "CSAFPID-1673525" ] } ], "title": "CVE-2024-6119" }, { "cve": "CVE-2024-6232", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "other", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" } ], "references": [ { "category": "self", "summary": "CVE-2024-6232", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json" } ], "title": "CVE-2024-6232" }, { "cve": "CVE-2024-7264", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1673529", "CSAFPID-1673479", "CSAFPID-1673511", "CSAFPID-1673512" ] }, "references": [ { "category": "self", "summary": "CVE-2024-7264", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7264.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673529", "CSAFPID-1673479", "CSAFPID-1673511", "CSAFPID-1673512" ] } ], "title": "CVE-2024-7264" }, { "cve": "CVE-2024-7592", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2024-7592", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json" } ], "title": "CVE-2024-7592" }, { "cve": "CVE-2024-21131", "product_status": { "known_affected": [ "CSAFPID-1503299", "CSAFPID-1503306", "CSAFPID-1503302", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21131", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21131.json" } ], "title": "CVE-2024-21131" }, { "cve": "CVE-2024-21138", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21138", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21138.json" } ], "title": "CVE-2024-21138" }, { "cve": "CVE-2024-21140", "product_status": { "known_affected": [ "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503299", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21140", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21140.json" } ], "title": "CVE-2024-21140" }, { "cve": "CVE-2024-21144", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21144", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21144.json" } ], "title": "CVE-2024-21144" }, { "cve": "CVE-2024-21145", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1503299", "CSAFPID-1503306", "CSAFPID-1503302", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21145", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21145.json" } ], "title": "CVE-2024-21145" }, { "cve": "CVE-2024-21147", "product_status": { "known_affected": [ "CSAFPID-1503306", "CSAFPID-1503302", "CSAFPID-1503299", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21147", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21147.json" } ], "title": "CVE-2024-21147" }, { "cve": "CVE-2024-21233", "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21233", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21233.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] } ], "title": "CVE-2024-21233" }, { "cve": "CVE-2024-21242", "product_status": { "known_affected": [ "CSAFPID-1673443", "CSAFPID-1673444", "CSAFPID-1673445" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21242", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21242.json" } ], "scores": [ { "cvss_v3": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-1673443", "CSAFPID-1673444", "CSAFPID-1673445" ] } ], "title": "CVE-2024-21242" }, { "cve": "CVE-2024-21251", "product_status": { "known_affected": [ "CSAFPID-1673450", "CSAFPID-1673451", "CSAFPID-1673452" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21251", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21251.json" } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673450", "CSAFPID-1673451", "CSAFPID-1673452" ] } ], "title": "CVE-2024-21251" }, { "cve": "CVE-2024-21261", "product_status": { "known_affected": [ "CSAFPID-1673144", "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21261", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21261.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673144", "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-21261" }, { "cve": "CVE-2024-22018", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22018", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22018.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-22018" }, { "cve": "CVE-2024-22020", "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22020", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22020.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-22020" }, { "cve": "CVE-2024-22201", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1673384", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22201", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22201.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673384", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-22201" }, { "cve": "CVE-2024-23807", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1650831", "CSAFPID-1650825", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23807", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23807.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650831", "CSAFPID-1650825", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-23807" }, { "cve": "CVE-2024-23944", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23944", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23944.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-23944" }, { "cve": "CVE-2024-24989", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-24989", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24989.json" } ], "title": "CVE-2024-24989" }, { "cve": "CVE-2024-24990", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-24990", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24990.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-24990" }, { "cve": "CVE-2024-25710", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1673384", "CSAFPID-816871", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-342816", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-912046", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-25710", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1673384", "CSAFPID-816871", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-342816", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-912046", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-25710" }, { "cve": "CVE-2024-26130", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-26130", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26130.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-26130" }, { "cve": "CVE-2024-26308", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1673384", "CSAFPID-816871", "CSAFPID-816798", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-26308", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1673384", "CSAFPID-816871", "CSAFPID-816798", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-26308" }, { "cve": "CVE-2024-27983", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27983", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27983.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-27983" }, { "cve": "CVE-2024-28182", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Detection of Error Condition Without Action", "title": "CWE-390" }, { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1673442", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28182", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673442", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-28182" }, { "cve": "CVE-2024-28849", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28849", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-28849" }, { "cve": "CVE-2024-28887", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "other", "text": "Uncontrolled Search Path Element", "title": "CWE-427" } ], "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28887", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28887.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] } ], "title": "CVE-2024-28887" }, { "cve": "CVE-2024-29025", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1673488", "CSAFPID-1673489", "CSAFPID-1673491", "CSAFPID-1673492", "CSAFPID-1673493", "CSAFPID-1673495", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29025", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1673488", "CSAFPID-1673489", "CSAFPID-1673491", "CSAFPID-1673492", "CSAFPID-1673493", "CSAFPID-1673495", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-29025" }, { "cve": "CVE-2024-29131", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1673497", "CSAFPID-1673397", "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29131", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29131.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1673497", "CSAFPID-1673397", "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-29131" }, { "cve": "CVE-2024-29133", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1673497", "CSAFPID-1673397", "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29133", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1673497", "CSAFPID-1673397", "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-29133" }, { "cve": "CVE-2024-31079", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-31079", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31079.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-31079" }, { "cve": "CVE-2024-32760", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32760", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32760.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-32760" }, { "cve": "CVE-2024-34161", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34161", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34161.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-34161" }, { "cve": "CVE-2024-34750", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "other", "text": "Improper Handling of Exceptional Conditions", "title": "CWE-755" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1673504", "CSAFPID-1673506" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34750", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673504", "CSAFPID-1673506" ] } ], "title": "CVE-2024-34750" }, { "cve": "CVE-2024-35200", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-35200", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35200.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-35200" }, { "cve": "CVE-2024-36137", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" }, { "category": "other", "text": "Incorrect Permission Assignment for Critical Resource", "title": "CWE-732" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-36137", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36137.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-36137" }, { "cve": "CVE-2024-36138", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-36138", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36138.json" } ], "title": "CVE-2024-36138" }, { "cve": "CVE-2024-36387", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-36387", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36387.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-36387" }, { "cve": "CVE-2024-37370", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-1673507", "CSAFPID-1673508", "CSAFPID-1673509" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37370", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673507", "CSAFPID-1673508", "CSAFPID-1673509" ] } ], "title": "CVE-2024-37370" }, { "cve": "CVE-2024-37371", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-1673507", "CSAFPID-1673508", "CSAFPID-1673509" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37371", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673507", "CSAFPID-1673508", "CSAFPID-1673509" ] } ], "title": "CVE-2024-37371" }, { "cve": "CVE-2024-37372", "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37372", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37372.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-37372" }, { "cve": "CVE-2024-38356", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-1673510", "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38356", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38356.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673510", "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-38356" }, { "cve": "CVE-2024-38357", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-1673510", "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38357", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38357.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673510", "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-38357" }, { "cve": "CVE-2024-38472", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38472", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38472.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38472" }, { "cve": "CVE-2024-38473", "cwe": { "id": "CWE-172", "name": "Encoding Error" }, "notes": [ { "category": "other", "text": "Encoding Error", "title": "CWE-172" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38473", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38473.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38473" }, { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-172", "name": "Encoding Error" }, "notes": [ { "category": "other", "text": "Encoding Error", "title": "CWE-172" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38474", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38474.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38474" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38475", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38475" }, { "cve": "CVE-2024-38476", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Inclusion of Functionality from Untrusted Control Sphere", "title": "CWE-829" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38476", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38476.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38476" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38477", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38477.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38477" }, { "cve": "CVE-2024-38998", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "notes": [ { "category": "other", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" } ], "product_status": { "known_affected": [ "CSAFPID-1673511", "CSAFPID-1673512", "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38998", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673511", "CSAFPID-1673512", "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-38998" }, { "cve": "CVE-2024-38999", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "notes": [ { "category": "other", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" } ], "product_status": { "known_affected": [ "CSAFPID-1673511", "CSAFPID-1673512", "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38999", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json" } ], "scores": [ { "cvss_v3": { "baseScore": 10.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673511", "CSAFPID-1673512", "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-38999" }, { "cve": "CVE-2024-39573", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-39573", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39573.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-39573" }, { "cve": "CVE-2024-39884", "cwe": { "id": "CWE-18", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-18", "title": "CWE-18" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-39884", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39884.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-39884" }, { "cve": "CVE-2024-40725", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Exposure of Resource to Wrong Sphere", "title": "CWE-668" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40725", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40725.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479" ] } ], "title": "CVE-2024-40725" }, { "cve": "CVE-2024-40898", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40898", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40898.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479" ] } ], "title": "CVE-2024-40898" }, { "cve": "CVE-2024-45490", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "other", "text": "Incorrect Calculation of Buffer Size", "title": "CWE-131" } ], "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45490", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] } ], "title": "CVE-2024-45490" }, { "cve": "CVE-2024-45491", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45491", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] } ], "title": "CVE-2024-45491" }, { "cve": "CVE-2024-45492", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45492", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] } ], "title": "CVE-2024-45492" }, { "cve": "CVE-2024-45801", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "other", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" }, { "category": "other", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" } ], "product_status": { "known_affected": [ "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45801", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45801.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-45801" } ] }
ncsc-2025-0027
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Oracle heeft meerdere kwetsbaarheden verholpen in zijn producten, waaronder Oracle Fusion Middleware, Oracle WebLogic Server, en Oracle HTTP Server.", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden bevinden zich in verschillende Oracle producten, waaronder Oracle WebLogic Server versies 12.2.1.4.0 en 14.1.1.0.0, die het mogelijk maken voor ongeauthenticeerde kwaadwillenden om toegang te krijgen tot kritieke gegevens. Dit kan leiden tot ernstige gevolgen voor de vertrouwelijkheid, integriteit en beschikbaarheid van de systemen. De kwetsbaarheid in Oracle HTTP Server versie 12.2.1.4.0 stelt kwaadwillenden in staat om ongeautoriseerde toegang te verkrijgen, met een CVSS-score van 5.3, terwijl de kwetsbaarheid in WebLogic Server een CVSS-score van 9.8 heeft, wat wijst op een kritieke impact. Kwaadwillenden kunnen ook gebruik maken van kwetsbaarheden in Oracle Fusion Middleware en andere producten om Denial-of-Service (DoS) aanvallen uit te voeren.", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)", "title": "CWE-338" }, { "category": "general", "text": "Path Traversal: \u0027.../...//\u0027", "title": "CWE-35" }, { "category": "general", "text": "Dependency on Vulnerable Third-Party Component", "title": "CWE-1395" }, { "category": "general", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" }, { "category": "general", "text": "Improper Handling of Exceptional Conditions", "title": "CWE-755" }, { "category": "general", "text": "Incorrect Permission Assignment for Critical Resource", "title": "CWE-732" }, { "category": "general", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "Insertion of Sensitive Information into Log File", "title": "CWE-532" }, { "category": "general", "text": "Use of Hard-coded Credentials", "title": "CWE-798" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "general", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; nvd; oracle", "url": "https://www.oracle.com/security-alerts/cpujan2025.html" } ], "title": "Kwetsbaarheden verholpen in Oracle Fusion Middleware", "tracking": { "current_release_date": "2025-01-22T13:36:27.908718Z", "id": "NCSC-2025-0027", "initial_release_date": "2025-01-22T13:36:27.908718Z", "revision_history": [ { "date": "2025-01-22T13:36:27.908718Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-93909", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-40303", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "http_server", "product": { "name": "http_server", "product_id": "CSAFPID-912074", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:http_server:14.1.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fusion_middleware_mapviewer", "product": { "name": "fusion_middleware_mapviewer", "product_id": "CSAFPID-226018", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:fusion_middleware_mapviewer:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fusion_middleware", "product": { "name": "fusion_middleware", "product_id": "CSAFPID-1646487", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:fusion_middleware:-:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fusion_middleware", "product": { "name": "fusion_middleware", "product_id": "CSAFPID-332789", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:fusion_middleware:11.1.1.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fusion_middleware", "product": { "name": "fusion_middleware", "product_id": "CSAFPID-1747074", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:fusion_middleware:12.2.1.19.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fusion_middleware", "product": { "name": "fusion_middleware", "product_id": "CSAFPID-342815", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:fusion_middleware:12.2.1.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fusion_middleware", "product": { "name": "fusion_middleware", "product_id": "CSAFPID-271904", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:fusion_middleware:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fusion_middleware", "product": { "name": "fusion_middleware", "product_id": "CSAFPID-503474", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:fusion_middleware:14.1.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fusion_middleware", "product": { "name": "fusion_middleware", "product_id": "CSAFPID-1674670", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:fusion_middleware:8.5.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "weblogic_server", "product": { "name": "weblogic_server", "product_id": "CSAFPID-3661", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "weblogic_server", "product": { "name": "weblogic_server", "product_id": "CSAFPID-3660", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "weblogic_server", "product": { "name": "weblogic_server", "product_id": "CSAFPID-1973", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "weblogic_server", "product": { "name": "weblogic_server", "product_id": "CSAFPID-1751293", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:weblogic_server:14.1.2.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "security_service", "product": { "name": "security_service", "product_id": "CSAFPID-199820", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:security_service:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "business_activity_monitoring", "product": { "name": "business_activity_monitoring", "product_id": "CSAFPID-228157", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:business_activity_monitoring:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "business_activity_monitoring__bam_", "product": { "name": "business_activity_monitoring__bam_", "product_id": "CSAFPID-764927", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:business_activity_monitoring__bam_:12.2.1.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "business_activity_monitoring__bam_", "product": { "name": "business_activity_monitoring__bam_", "product_id": "CSAFPID-764928", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:business_activity_monitoring__bam_:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "identity_manager", "product": { "name": "identity_manager", "product_id": "CSAFPID-220164", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:identity_manager:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "managed_file_transfer", "product": { "name": "managed_file_transfer", "product_id": "CSAFPID-204581", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:managed_file_transfer:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "middleware_common_libraries_and_tools", "product": { "name": "middleware_common_libraries_and_tools", "product_id": "CSAFPID-94398", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:middleware_common_libraries_and_tools:12.2.1.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "middleware_common_libraries_and_tools", "product": { "name": "middleware_common_libraries_and_tools", "product_id": "CSAFPID-94309", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:middleware_common_libraries_and_tools:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "middleware_common_libraries_and_tools", "product": { "name": "middleware_common_libraries_and_tools", "product_id": "CSAFPID-94393", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:middleware_common_libraries_and_tools:14.1.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "business_process_management_suite", "product": { "name": "business_process_management_suite", "product_id": "CSAFPID-9043", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:business_process_management_suite:12.2.1.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "business_process_management_suite", "product": { "name": "business_process_management_suite", "product_id": "CSAFPID-9642", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:business_process_management_suite:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "outside_in_technology", "product": { "name": "outside_in_technology", "product_id": "CSAFPID-1260", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:outside_in_technology:8.5.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "outside_in_technology", "product": { "name": "outside_in_technology", "product_id": "CSAFPID-912053", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:outside_in_technology:8.5.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "webcenter_portal", "product": { "name": "webcenter_portal", "product_id": "CSAFPID-135359", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "webcenter_portal", "product": { "name": "webcenter_portal", "product_id": "CSAFPID-45194", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-12415", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "other", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" } ], "product_status": { "known_affected": [ "CSAFPID-45194", "CSAFPID-135359", "CSAFPID-1646487", "CSAFPID-9642", "CSAFPID-40303", "CSAFPID-220164", "CSAFPID-204581", "CSAFPID-94309", "CSAFPID-1260", "CSAFPID-3661", "CSAFPID-3660", "CSAFPID-1973", "CSAFPID-94393", "CSAFPID-226018", "CSAFPID-764927", "CSAFPID-764928", "CSAFPID-9043", "CSAFPID-93909", "CSAFPID-94398" ] }, "references": [ { "category": "self", "summary": "CVE-2019-12415", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-12415.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-45194", "CSAFPID-135359", "CSAFPID-1646487", "CSAFPID-9642", "CSAFPID-40303", "CSAFPID-220164", "CSAFPID-204581", "CSAFPID-94309", "CSAFPID-1260", "CSAFPID-3661", "CSAFPID-3660", "CSAFPID-1973", "CSAFPID-94393", "CSAFPID-226018", "CSAFPID-764927", "CSAFPID-764928", "CSAFPID-9043", "CSAFPID-93909", "CSAFPID-94398" ] } ], "title": "CVE-2019-12415" }, { "cve": "CVE-2023-7272", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-3660", "CSAFPID-1973" ] }, "references": [ { "category": "self", "summary": "CVE-2023-7272", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-7272.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-3660", "CSAFPID-1973" ] } ], "title": "CVE-2023-7272" }, { "cve": "CVE-2023-38709", "cwe": { "id": "CWE-113", "name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)", "title": "CWE-113" }, { "category": "other", "text": "Improper Validation of Specified Quantity in Input", "title": "CWE-1284" } ], "product_status": { "known_affected": [ "CSAFPID-228157", "CSAFPID-271904", "CSAFPID-40303", "CSAFPID-220164", "CSAFPID-94309", "CSAFPID-912053", "CSAFPID-45194", "CSAFPID-3660", "CSAFPID-1973" ] }, "references": [ { "category": "self", "summary": "CVE-2023-38709", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38709.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-228157", "CSAFPID-271904", "CSAFPID-40303", "CSAFPID-220164", "CSAFPID-94309", "CSAFPID-912053", "CSAFPID-45194", "CSAFPID-3660", "CSAFPID-1973" ] } ], "title": "CVE-2023-38709" }, { "cve": "CVE-2023-39410", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1260", "CSAFPID-1973", "CSAFPID-3660", "CSAFPID-9642", "CSAFPID-40303", "CSAFPID-45194", "CSAFPID-94309", "CSAFPID-204581", "CSAFPID-220164", "CSAFPID-271904" ] }, "references": [ { "category": "self", "summary": "CVE-2023-39410", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39410.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1260", "CSAFPID-1973", "CSAFPID-3660", "CSAFPID-9642", "CSAFPID-40303", "CSAFPID-45194", "CSAFPID-94309", "CSAFPID-204581", "CSAFPID-220164", "CSAFPID-271904" ] } ], "title": "CVE-2023-39410" }, { "cve": "CVE-2023-44483", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "notes": [ { "category": "other", "text": "Insertion of Sensitive Information into Log File", "title": "CWE-532" } ], "product_status": { "known_affected": [ "CSAFPID-1260", "CSAFPID-1973", "CSAFPID-3660", "CSAFPID-9642", "CSAFPID-40303", "CSAFPID-45194", "CSAFPID-94309", "CSAFPID-204581", "CSAFPID-220164", "CSAFPID-271904", "CSAFPID-94393", "CSAFPID-226018", "CSAFPID-912053", "CSAFPID-912074", "CSAFPID-228157" ] }, "references": [ { "category": "self", "summary": "CVE-2023-44483", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44483.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1260", "CSAFPID-1973", "CSAFPID-3660", "CSAFPID-9642", "CSAFPID-40303", "CSAFPID-45194", "CSAFPID-94309", "CSAFPID-204581", "CSAFPID-220164", "CSAFPID-271904", "CSAFPID-94393", "CSAFPID-226018", "CSAFPID-912053", "CSAFPID-912074", "CSAFPID-228157" ] } ], "title": "CVE-2023-44483" }, { "cve": "CVE-2023-49582", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "other", "text": "Incorrect Permission Assignment for Critical Resource", "title": "CWE-732" }, { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" } ], "product_status": { "known_affected": [ "CSAFPID-40303" ] }, "references": [ { "category": "self", "summary": "CVE-2023-49582", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49582.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-40303" ] } ], "title": "CVE-2023-49582" }, { "cve": "CVE-2023-51775", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-332789", "CSAFPID-342815", "CSAFPID-1674670", "CSAFPID-503474", "CSAFPID-1260", "CSAFPID-1973", "CSAFPID-3660", "CSAFPID-40303", "CSAFPID-45194", "CSAFPID-94309", "CSAFPID-94393", "CSAFPID-204581", "CSAFPID-220164", "CSAFPID-226018", "CSAFPID-912053", "CSAFPID-912074", "CSAFPID-228157", "CSAFPID-271904" ] }, "references": [ { "category": "self", "summary": "CVE-2023-51775", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51775.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-332789", "CSAFPID-342815", "CSAFPID-1674670", "CSAFPID-503474", "CSAFPID-1260", "CSAFPID-1973", "CSAFPID-3660", "CSAFPID-40303", "CSAFPID-45194", "CSAFPID-94309", "CSAFPID-94393", "CSAFPID-204581", "CSAFPID-220164", "CSAFPID-226018", "CSAFPID-912053", "CSAFPID-912074", "CSAFPID-228157", "CSAFPID-271904" ] } ], "title": "CVE-2023-51775" }, { "cve": "CVE-2024-5535", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "other", "text": "Dependency on Vulnerable Third-Party Component", "title": "CWE-1395" } ], "product_status": { "known_affected": [ "CSAFPID-40303" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5535", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-40303" ] } ], "title": "CVE-2024-5535" }, { "cve": "CVE-2024-6119", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" } ], "product_status": { "known_affected": [ "CSAFPID-40303" ] }, "references": [ { "category": "self", "summary": "CVE-2024-6119", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6119.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-40303" ] } ], "title": "CVE-2024-6119" }, { "cve": "CVE-2024-8096", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "other", "text": "Improper Certificate Validation", "title": "CWE-295" } ], "product_status": { "known_affected": [ "CSAFPID-40303" ] }, "references": [ { "category": "self", "summary": "CVE-2024-8096", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8096.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-40303" ] } ], "title": "CVE-2024-8096" }, { "cve": "CVE-2024-23635", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-1260", "CSAFPID-1973", "CSAFPID-3660", "CSAFPID-40303", "CSAFPID-45194", "CSAFPID-94309", "CSAFPID-94393", "CSAFPID-204581", "CSAFPID-220164", "CSAFPID-226018", "CSAFPID-912053", "CSAFPID-912074", "CSAFPID-228157", "CSAFPID-271904" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23635", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23635.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1260", "CSAFPID-1973", "CSAFPID-3660", "CSAFPID-40303", "CSAFPID-45194", "CSAFPID-94309", "CSAFPID-94393", "CSAFPID-204581", "CSAFPID-220164", "CSAFPID-226018", "CSAFPID-912053", "CSAFPID-912074", "CSAFPID-228157", "CSAFPID-271904" ] } ], "title": "CVE-2024-23635" }, { "cve": "CVE-2024-29857", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-228157", "CSAFPID-271904", "CSAFPID-40303", "CSAFPID-220164", "CSAFPID-94309", "CSAFPID-912053", "CSAFPID-45194", "CSAFPID-3660", "CSAFPID-1973", "CSAFPID-1747074", "CSAFPID-1674670", "CSAFPID-503474" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29857", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29857.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-228157", "CSAFPID-271904", "CSAFPID-40303", "CSAFPID-220164", "CSAFPID-94309", "CSAFPID-912053", "CSAFPID-45194", "CSAFPID-3660", "CSAFPID-1973", "CSAFPID-1747074", "CSAFPID-1674670", "CSAFPID-503474" ] } ], "title": "CVE-2024-29857" }, { "cve": "CVE-2024-30171", "cwe": { "id": "CWE-208", "name": "Observable Timing Discrepancy" }, "notes": [ { "category": "other", "text": "Observable Timing Discrepancy", "title": "CWE-208" }, { "category": "other", "text": "Observable Discrepancy", "title": "CWE-203" } ], "product_status": { "known_affected": [ "CSAFPID-228157", "CSAFPID-271904", "CSAFPID-40303", "CSAFPID-220164", "CSAFPID-94309", "CSAFPID-912053", "CSAFPID-45194", "CSAFPID-3660", "CSAFPID-1973" ] }, "references": [ { "category": "self", "summary": "CVE-2024-30171", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30171.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-228157", "CSAFPID-271904", "CSAFPID-40303", "CSAFPID-220164", "CSAFPID-94309", "CSAFPID-912053", "CSAFPID-45194", "CSAFPID-3660", "CSAFPID-1973" ] } ], "title": "CVE-2024-30171" }, { "cve": "CVE-2024-30172", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-228157", "CSAFPID-271904", "CSAFPID-40303", "CSAFPID-220164", "CSAFPID-94309", "CSAFPID-912053", "CSAFPID-45194", "CSAFPID-3660", "CSAFPID-1973" ] }, "references": [ { "category": "self", "summary": "CVE-2024-30172", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30172.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-228157", "CSAFPID-271904", "CSAFPID-40303", "CSAFPID-220164", "CSAFPID-94309", "CSAFPID-912053", "CSAFPID-45194", "CSAFPID-3660", "CSAFPID-1973" ] } ], "title": "CVE-2024-30172" }, { "cve": "CVE-2024-34447", "cwe": { "id": "CWE-706", "name": "Use of Incorrectly-Resolved Name or Reference" }, "notes": [ { "category": "other", "text": "Use of Incorrectly-Resolved Name or Reference", "title": "CWE-706" } ], "product_status": { "known_affected": [ "CSAFPID-228157", "CSAFPID-271904", "CSAFPID-40303", "CSAFPID-220164", "CSAFPID-94309", "CSAFPID-912053", "CSAFPID-45194", "CSAFPID-3660", "CSAFPID-1973" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34447", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34447.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-228157", "CSAFPID-271904", "CSAFPID-40303", "CSAFPID-220164", "CSAFPID-94309", "CSAFPID-912053", "CSAFPID-45194", "CSAFPID-3660", "CSAFPID-1973" ] } ], "title": "CVE-2024-34447" }, { "cve": "CVE-2024-34750", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "other", "text": "Improper Handling of Exceptional Conditions", "title": "CWE-755" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-204581" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34750", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-204581" ] } ], "title": "CVE-2024-34750" }, { "cve": "CVE-2024-37370", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-199820" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37370", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-199820" ] } ], "title": "CVE-2024-37370" }, { "cve": "CVE-2024-37371", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-199820" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37371", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-199820" ] } ], "title": "CVE-2024-37371" }, { "cve": "CVE-2024-38473", "cwe": { "id": "CWE-172", "name": "Encoding Error" }, "notes": [ { "category": "other", "text": "Encoding Error", "title": "CWE-172" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "product_status": { "known_affected": [ "CSAFPID-40303" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38473", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38473.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-40303" ] } ], "title": "CVE-2024-38473" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" }, { "category": "other", "text": "Path Traversal: \u0027.../...//\u0027", "title": "CWE-35" }, { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "other", "text": "Use of Hard-coded Credentials", "title": "CWE-798" }, { "category": "other", "text": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)", "title": "CWE-338" } ], "product_status": { "known_affected": [ "CSAFPID-40303" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38475", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-40303" ] } ], "title": "CVE-2024-38475" }, { "cve": "CVE-2024-38816", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "other", "text": "Relative Path Traversal", "title": "CWE-23" } ], "product_status": { "known_affected": [ "CSAFPID-94309", "CSAFPID-220164" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38816", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38816.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-94309", "CSAFPID-220164" ] } ], "title": "CVE-2024-38816" }, { "cve": "CVE-2024-38819", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" } ], "product_status": { "known_affected": [ "CSAFPID-94309", "CSAFPID-220164" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38819", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-94309", "CSAFPID-220164" ] } ], "title": "CVE-2024-38819" }, { "cve": "CVE-2024-38998", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "notes": [ { "category": "other", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" } ], "product_status": { "known_affected": [ "CSAFPID-228157", "CSAFPID-9642", "CSAFPID-226018", "CSAFPID-45194" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38998", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-228157", "CSAFPID-9642", "CSAFPID-226018", "CSAFPID-45194" ] } ], "title": "CVE-2024-38998" }, { "cve": "CVE-2024-38999", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "notes": [ { "category": "other", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" } ], "product_status": { "known_affected": [ "CSAFPID-9642", "CSAFPID-228157", "CSAFPID-332789", "CSAFPID-342815", "CSAFPID-271904", "CSAFPID-1674670", "CSAFPID-503474", "CSAFPID-226018", "CSAFPID-45194" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38999", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json" } ], "scores": [ { "cvss_v3": { "baseScore": 10.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-9642", "CSAFPID-228157", "CSAFPID-332789", "CSAFPID-342815", "CSAFPID-271904", "CSAFPID-1674670", "CSAFPID-503474", "CSAFPID-226018", "CSAFPID-45194" ] } ], "title": "CVE-2024-38999" }, { "cve": "CVE-2024-40898", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "product_status": { "known_affected": [ "CSAFPID-40303" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40898", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40898.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-40303" ] } ], "title": "CVE-2024-40898" }, { "cve": "CVE-2024-45490", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "other", "text": "Incorrect Calculation of Buffer Size", "title": "CWE-131" }, { "category": "other", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" } ], "product_status": { "known_affected": [ "CSAFPID-912053", "CSAFPID-40303" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45490", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-912053", "CSAFPID-40303" ] } ], "title": "CVE-2024-45490" }, { "cve": "CVE-2024-45491", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-912053", "CSAFPID-40303" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45491", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-912053", "CSAFPID-40303" ] } ], "title": "CVE-2024-45491" }, { "cve": "CVE-2024-45492", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-912053", "CSAFPID-332789", "CSAFPID-342815", "CSAFPID-271904", "CSAFPID-1674670", "CSAFPID-503474", "CSAFPID-40303" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45492", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-912053", "CSAFPID-332789", "CSAFPID-342815", "CSAFPID-271904", "CSAFPID-1674670", "CSAFPID-503474", "CSAFPID-40303" ] } ], "title": "CVE-2024-45492" }, { "cve": "CVE-2024-47072", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" } ], "product_status": { "known_affected": [ "CSAFPID-228157" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47072", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47072.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-228157" ] } ], "title": "CVE-2024-47072" }, { "cve": "CVE-2024-47554", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1751293", "CSAFPID-45194", "CSAFPID-1973", "CSAFPID-3660" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47554", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751293", "CSAFPID-45194", "CSAFPID-1973", "CSAFPID-3660" ] } ], "title": "CVE-2024-47554" }, { "cve": "CVE-2024-47561", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" } ], "product_status": { "known_affected": [ "CSAFPID-9642" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47561", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-9642" ] } ], "title": "CVE-2024-47561" }, { "cve": "CVE-2025-21498", "product_status": { "known_affected": [ "CSAFPID-40303" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21498", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21498.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-40303" ] } ], "title": "CVE-2025-21498" }, { "cve": "CVE-2025-21535", "product_status": { "known_affected": [ "CSAFPID-3660", "CSAFPID-1973" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21535", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21535.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-3660", "CSAFPID-1973" ] } ], "title": "CVE-2025-21535" }, { "cve": "CVE-2025-21549", "product_status": { "known_affected": [ "CSAFPID-1973" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21549", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21549.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1973" ] } ], "title": "CVE-2025-21549" } ] }
rhsa-2024_5239
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 5 is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products and packaged under Red Hat JBoss Core Services, to allow for faster distribution of updates and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 5 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 4, and includes bug fixes and enhancements, which are documented in the Release Notes linked to in the References section.\n\nSecurity Fix(es):\n\n* jbcs-httpd24-httpd: Potential SSRF in mod_rewrite (CVE-2024-39573)\n* jbcs-httpd24-httpd: null pointer dereference in mod_proxy (CVE-2024-38477)\n* jbcs-httpd24-httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n* jbcs-httpd24-httpd: Encoding problem in mod_proxy (CVE-2024-38473)\n* jbcs-httpd24-httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n* jbcs-httpd24-httpd: Security issues via backend applications whose response headers are malicious or exploitable (CVE-2024-38476)\n\nA Red Hat Security Bulletin which addresses further details about this flaw is available in the References section.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:5239", "url": "https://access.redhat.com/errata/RHSA-2024:5239" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_core_services/2.4.57/html/red_hat_jboss_core_services_apache_http_server_2.4.57_service_pack_5_release_notes/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_core_services/2.4.57/html/red_hat_jboss_core_services_apache_http_server_2.4.57_service_pack_5_release_notes/index" }, { "category": "external", "summary": "2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295015" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5239.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP5 security update", "tracking": { "current_release_date": "2024-12-17T09:15:21+00:00", "generator": { "date": "2024-12-17T09:15:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:5239", "initial_release_date": "2024-08-13T13:18:01+00:00", "revision_history": [ { "date": "2024-08-13T13:18:01+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-08-13T13:18:01+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T09:15:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product": { "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el7" } } }, { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 8", "product": { "name": "Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el8" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "product_id": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.57-13.el7jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "product_id": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.19-41.el7jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "product": { "name": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "product_id": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.49-11.redhat_1.el7jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "product": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "product_id": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster@1.3.20-8.el7jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.3-40.el7jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "product": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "product_id": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.4.24-11.el7jbcs?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "product_id": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.57-13.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "product_id": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.19-41.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "product_id": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.49-11.redhat_1.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "product_id": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster@1.3.20-8.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.3-40.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "product_id": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.4.24-11.el8jbcs?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.57-13.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.57-13.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.57-13.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.57-13.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.57-13.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.57-13.el7jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.57-13.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.57-13.el7jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.57-13.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.19-41.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.19-41.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.49-11.redhat_1.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.49-11.redhat_1.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster@1.3.20-8.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster-debuginfo@1.3.20-8.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.3-40.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.3-40.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.4.24-11.el7jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.4.24-11.el7jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.57-13.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.57-13.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools-debuginfo@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap-debuginfo@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html-debuginfo@2.4.57-13.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session-debuginfo@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl-debuginfo@2.4.57-13.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.19-41.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.19-41.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.49-11.redhat_1.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24-debuginfo@1.2.49-11.redhat_1.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster@1.3.20-8.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster-debuginfo@1.3.20-8.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.3-40.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.3-40.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.4.24-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.4.24-11.el8jbcs?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.57-13.el7jbcs?arch=noarch" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.57-13.el8jbcs?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src" }, "product_reference": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src" }, "product_reference": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src" }, "product_reference": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38473", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:36+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295012" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. Due to an encoding problem, specially crafted request URLs with incorrect encoding can be sent to backend services, potentially bypassing authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Encoding problem in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations where mechanisms other than ProxyPass/ProxyPassMatch or RewriteRule with the \u0027P\u0027 flag are used to configure a request to be proxied, such as SetHandler or inadvertent proxying via CVE-2024-39573. Note that these alternate mechanisms may be used within .htaccess files.\n\nFor more information about CVE-2024-39573, see https://access.redhat.com/security/cve/CVE-2024-39573.\n\nAdditionally, this flaw requires mod_proxy to be loaded and being used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38473" }, { "category": "external", "summary": "RHBZ#2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38473", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:18:01+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5239" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Encoding problem in mod_proxy" }, { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:18:01+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5239" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:18:01+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5239" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38476", "cwe": { "id": "CWE-829", "name": "Inclusion of Functionality from Untrusted Control Sphere" }, "discovery_date": "2024-07-01T19:22:16+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295015" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. Backend applications whose response headers are malicious or exploitable may allow information disclosure, server-side request forgery (SSRF) or local script execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Security issues via\u00a0backend applications whose response headers are malicious or exploitable", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw can only be exploited by backend applications via malicious or exploitable response headers. For this reason, this flaw was rated with an important and not critical severity.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38476" }, { "category": "external", "summary": "RHBZ#2295015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295015" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38476", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38476" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38476", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38476" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:18:01+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5239" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Security issues via\u00a0backend applications whose response headers are malicious or exploitable" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:18:01+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5239" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" }, { "cve": "CVE-2024-39573", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295022" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. A potential SSRF allows an attacker to cause unsafe rules used in the RewriteRule directive to unexpectedly set up URLs to be handled by the mod_proxy module.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Potential SSRF in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive.\n\nAdditionally, this flaw requires mod_rewrite and mod_proxy to be loaded and being used. These modules can be disabled via the configuration file if their functionality are not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-39573" }, { "category": "external", "summary": "RHBZ#2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-39573", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:18:01+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5239" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Potential SSRF in mod_rewrite" } ] }
RHSA-2024:4862
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4862", "url": "https://access.redhat.com/errata/RHSA-2024:4862" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4862.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2025-01-09T06:22:55+00:00", "generator": { "date": "2025-01-09T06:22:55+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2024:4862", "initial_release_date": "2024-07-25T08:41:39+00:00", "revision_history": [ { "date": "2024-07-25T08:41:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-25T08:41:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-09T06:22:55+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.53-11.el9_2.8.src", "product": { "name": "httpd-0:2.4.53-11.el9_2.8.src", "product_id": "httpd-0:2.4.53-11.el9_2.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.53-11.el9_2.8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-core-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-core-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_lua-0:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_lua-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.53-11.el9_2.8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_session-0:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_session-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-11.el9_2.8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-11.el9_2.8?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.53-11.el9_2.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_session-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_session-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-core-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-core-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_lua-0:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_lua-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.53-11.el9_2.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_session-0:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_session-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-11.el9_2.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-11.el9_2.8?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-core-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-core-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-devel-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-tools-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.s390x", "product_id": "mod_ldap-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_lua-0:2.4.53-11.el9_2.8.s390x", "product_id": "mod_lua-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "product_id": "mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.53-11.el9_2.8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_session-0:2.4.53-11.el9_2.8.s390x", "product_id": "mod_session-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.s390x", "product_id": "mod_ssl-1:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_id": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-11.el9_2.8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_id": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-11.el9_2.8?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "product": { "name": "httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "product_id": "httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.8?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.53-11.el9_2.8.noarch", "product": { "name": "httpd-manual-0:2.4.53-11.el9_2.8.noarch", "product_id": "httpd-manual-0:2.4.53-11.el9_2.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.53-11.el9_2.8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.53-11.el9_2.8.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src" }, "product_reference": "httpd-0:2.4.53-11.el9_2.8.src", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-core-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-core-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-core-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-devel-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.53-11.el9_2.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch" }, "product_reference": "httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.53-11.el9_2.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch" }, "product_reference": "httpd-manual-0:2.4.53-11.el9_2.8.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-tools-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_ldap-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_lua-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_lua-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_lua-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_session-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_session-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_session-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_session-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_ssl-1:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-25T08:41:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4862" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-25T08:41:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4862" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-25T08:41:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4862" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
rhsa-2024_4863
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4863", "url": "https://access.redhat.com/errata/RHSA-2024:4863" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4863.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2024-12-17T09:16:30+00:00", "generator": { "date": "2024-12-17T09:16:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:4863", "initial_release_date": "2024-07-25T08:34:04+00:00", "revision_history": [ { "date": "2024-07-25T08:34:04+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-25T08:34:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T09:16:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.51-7.el9_0.7.src", "product": { "name": "httpd-0:2.4.51-7.el9_0.7.src", "product_id": "httpd-0:2.4.51-7.el9_0.7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.51-7.el9_0.7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "httpd-0:2.4.51-7.el9_0.7.aarch64", "product_id": "httpd-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "product_id": "httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "product_id": "httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_lua-0:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_lua-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.51-7.el9_0.7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_session-0:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_session-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.51-7.el9_0.7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "product_id": "httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_id": "httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.51-7.el9_0.7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.51-7.el9_0.7?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "httpd-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "httpd-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.51-7.el9_0.7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_session-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_session-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.51-7.el9_0.7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.51-7.el9_0.7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.51-7.el9_0.7?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "httpd-0:2.4.51-7.el9_0.7.x86_64", "product_id": "httpd-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "product_id": "httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "product_id": "httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_lua-0:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_lua-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.51-7.el9_0.7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_session-0:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_session-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.51-7.el9_0.7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "product_id": "httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_id": "httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.51-7.el9_0.7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.51-7.el9_0.7?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "httpd-0:2.4.51-7.el9_0.7.s390x", "product_id": "httpd-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.s390x", "product_id": "httpd-devel-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.s390x", "product_id": "httpd-tools-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.s390x", "product_id": "mod_ldap-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_lua-0:2.4.51-7.el9_0.7.s390x", "product_id": "mod_lua-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "product_id": "mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.51-7.el9_0.7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_session-0:2.4.51-7.el9_0.7.s390x", "product_id": "mod_session-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.s390x", "product_id": "mod_ssl-1:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.51-7.el9_0.7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "product_id": "httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_id": "httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_id": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.51-7.el9_0.7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_id": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.51-7.el9_0.7?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "product": { "name": "httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "product_id": "httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.51-7.el9_0.7?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.51-7.el9_0.7.noarch", "product": { "name": "httpd-manual-0:2.4.51-7.el9_0.7.noarch", "product_id": "httpd-manual-0:2.4.51-7.el9_0.7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.51-7.el9_0.7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "httpd-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "httpd-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "httpd-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.51-7.el9_0.7.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src" }, "product_reference": "httpd-0:2.4.51-7.el9_0.7.src", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "httpd-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "httpd-devel-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.51-7.el9_0.7.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch" }, "product_reference": "httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.51-7.el9_0.7.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch" }, "product_reference": "httpd-manual-0:2.4.51-7.el9_0.7.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "httpd-tools-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_ldap-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_lua-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_lua-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_lua-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_session-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_session-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_session-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_session-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_ssl-1:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-25T08:34:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4863" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-25T08:34:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4863" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-25T08:34:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4863" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
RHSA-2024:4719
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4719", "url": "https://access.redhat.com/errata/RHSA-2024:4719" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4719.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2025-01-09T06:23:25+00:00", "generator": { "date": "2025-01-09T06:23:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2024:4719", "initial_release_date": "2024-07-23T08:59:27+00:00", "revision_history": [ { "date": "2024-07-23T08:59:27+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-23T08:59:27+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-09T06:23:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8080020240717184413:63b34585", "product": { "name": "httpd:2.4:8080020240717184413:63b34585", "product_id": "httpd:2.4:8080020240717184413:63b34585", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8080020240717184413:63b34585" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "product_id": "httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "product": { "name": "httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "product_id": "httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "product": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "product_id": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "product": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "product_id": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=src" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product_id": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product_id": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product_id": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product_id": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product_id": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product_id": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product_id": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product_id": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product_id": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product_id": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product_id": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product_id": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, "product_reference": "httpd:2.4:8080020240717184413:63b34585", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src" }, "product_reference": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch" }, "product_reference": "httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64" }, "product_reference": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le" }, "product_reference": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x" }, "product_reference": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src" }, "product_reference": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64" }, "product_reference": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x" }, "product_reference": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:59:27+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4719" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:59:27+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4719" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:59:27+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4719" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
RHSA-2024:5240
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 5 is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products and packaged under Red Hat JBoss Core Services, to allow for faster distribution of updates and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 5 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 4, and includes bug fixes and enhancements, which are documented in the Release Notes linked to in the References section.\n\nSecurity Fix(es):\n\n* jbcs-httpd24-httpd: Potential SSRF in mod_rewrite (CVE-2024-39573)\n* jbcs-httpd24-httpd: null pointer dereference in mod_proxy (CVE-2024-38477)\n* jbcs-httpd24-httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n* jbcs-httpd24-httpd: Encoding problem in mod_proxy (CVE-2024-38473)\n* jbcs-httpd24-httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n* jbcs-httpd24-httpd: Security issues via backend applications whose response headers are malicious or exploitable (CVE-2024-38476)\n\nA Red Hat Security Bulletin which addresses further details about this flaw is available in the References section.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:5240", "url": "https://access.redhat.com/errata/RHSA-2024:5240" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_core_services/2.4.57/html/red_hat_jboss_core_services_apache_http_server_2.4.57_service_pack_5_release_notes/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_core_services/2.4.57/html/red_hat_jboss_core_services_apache_http_server_2.4.57_service_pack_5_release_notes/index" }, { "category": "external", "summary": "2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295015" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5240.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP5 security update", "tracking": { "current_release_date": "2025-01-09T06:23:19+00:00", "generator": { "date": "2025-01-09T06:23:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2024:5240", "initial_release_date": "2024-08-13T13:06:23+00:00", "revision_history": [ { "date": "2024-08-13T13:06:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-08-13T13:06:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-09T06:23:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Text-Only JBCS", "product": { "name": "Text-Only JBCS", "product_id": "Text-Only JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38473", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:36+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295012" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. Due to an encoding problem, specially crafted request URLs with incorrect encoding can be sent to backend services, potentially bypassing authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Encoding problem in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations where mechanisms other than ProxyPass/ProxyPassMatch or RewriteRule with the \u0027P\u0027 flag are used to configure a request to be proxied, such as SetHandler or inadvertent proxying via CVE-2024-39573. Note that these alternate mechanisms may be used within .htaccess files.\n\nFor more information about CVE-2024-39573, see https://access.redhat.com/security/cve/CVE-2024-39573.\n\nAdditionally, this flaw requires mod_proxy to be loaded and being used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38473" }, { "category": "external", "summary": "RHBZ#2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38473", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:06:23+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5240" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Text-Only JBCS" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Encoding problem in mod_proxy" }, { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:06:23+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5240" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "Text-Only JBCS" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:06:23+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5240" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "Text-Only JBCS" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38476", "cwe": { "id": "CWE-829", "name": "Inclusion of Functionality from Untrusted Control Sphere" }, "discovery_date": "2024-07-01T19:22:16+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295015" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. Backend applications whose response headers are malicious or exploitable may allow information disclosure, server-side request forgery (SSRF) or local script execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Security issues via\u00a0backend applications whose response headers are malicious or exploitable", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw can only be exploited by backend applications via malicious or exploitable response headers. For this reason, this flaw was rated with an important and not critical severity.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38476" }, { "category": "external", "summary": "RHBZ#2295015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295015" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38476", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38476" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38476", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38476" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:06:23+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5240" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "Text-Only JBCS" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Security issues via\u00a0backend applications whose response headers are malicious or exploitable" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:06:23+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5240" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "Text-Only JBCS" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" }, { "cve": "CVE-2024-39573", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295022" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. A potential SSRF allows an attacker to cause unsafe rules used in the RewriteRule directive to unexpectedly set up URLs to be handled by the mod_proxy module.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Potential SSRF in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive.\n\nAdditionally, this flaw requires mod_rewrite and mod_proxy to be loaded and being used. These modules can be disabled via the configuration file if their functionality are not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-39573" }, { "category": "external", "summary": "RHBZ#2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-39573", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:06:23+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5240" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Text-Only JBCS" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Potential SSRF in mod_rewrite" } ] }
rhsa-2024:4863
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4863", "url": "https://access.redhat.com/errata/RHSA-2024:4863" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4863.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2025-01-09T06:23:06+00:00", "generator": { "date": "2025-01-09T06:23:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2024:4863", "initial_release_date": "2024-07-25T08:34:04+00:00", "revision_history": [ { "date": "2024-07-25T08:34:04+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-25T08:34:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-09T06:23:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.51-7.el9_0.7.src", "product": { "name": "httpd-0:2.4.51-7.el9_0.7.src", "product_id": "httpd-0:2.4.51-7.el9_0.7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.51-7.el9_0.7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "httpd-0:2.4.51-7.el9_0.7.aarch64", "product_id": "httpd-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "product_id": "httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "product_id": "httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_lua-0:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_lua-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.51-7.el9_0.7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_session-0:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_session-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.51-7.el9_0.7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "product_id": "httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_id": "httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.51-7.el9_0.7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.51-7.el9_0.7?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "httpd-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "httpd-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.51-7.el9_0.7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_session-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_session-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.51-7.el9_0.7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.51-7.el9_0.7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.51-7.el9_0.7?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "httpd-0:2.4.51-7.el9_0.7.x86_64", "product_id": "httpd-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "product_id": "httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "product_id": "httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_lua-0:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_lua-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.51-7.el9_0.7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_session-0:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_session-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.51-7.el9_0.7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "product_id": "httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_id": "httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.51-7.el9_0.7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.51-7.el9_0.7?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "httpd-0:2.4.51-7.el9_0.7.s390x", "product_id": "httpd-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.s390x", "product_id": "httpd-devel-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.s390x", "product_id": "httpd-tools-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.s390x", "product_id": "mod_ldap-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_lua-0:2.4.51-7.el9_0.7.s390x", "product_id": "mod_lua-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "product_id": "mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.51-7.el9_0.7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_session-0:2.4.51-7.el9_0.7.s390x", "product_id": "mod_session-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.s390x", "product_id": "mod_ssl-1:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.51-7.el9_0.7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "product_id": "httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_id": "httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_id": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.51-7.el9_0.7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_id": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.51-7.el9_0.7?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "product": { "name": "httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "product_id": "httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.51-7.el9_0.7?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.51-7.el9_0.7.noarch", "product": { "name": "httpd-manual-0:2.4.51-7.el9_0.7.noarch", "product_id": "httpd-manual-0:2.4.51-7.el9_0.7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.51-7.el9_0.7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "httpd-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "httpd-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "httpd-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.51-7.el9_0.7.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src" }, "product_reference": "httpd-0:2.4.51-7.el9_0.7.src", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "httpd-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "httpd-devel-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.51-7.el9_0.7.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch" }, "product_reference": "httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.51-7.el9_0.7.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch" }, "product_reference": "httpd-manual-0:2.4.51-7.el9_0.7.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "httpd-tools-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_ldap-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_lua-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_lua-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_lua-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_session-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_session-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_session-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_session-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_ssl-1:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-25T08:34:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4863" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-25T08:34:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4863" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-25T08:34:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4863" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
rhsa-2024:5239
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 5 is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products and packaged under Red Hat JBoss Core Services, to allow for faster distribution of updates and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 5 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 4, and includes bug fixes and enhancements, which are documented in the Release Notes linked to in the References section.\n\nSecurity Fix(es):\n\n* jbcs-httpd24-httpd: Potential SSRF in mod_rewrite (CVE-2024-39573)\n* jbcs-httpd24-httpd: null pointer dereference in mod_proxy (CVE-2024-38477)\n* jbcs-httpd24-httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n* jbcs-httpd24-httpd: Encoding problem in mod_proxy (CVE-2024-38473)\n* jbcs-httpd24-httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n* jbcs-httpd24-httpd: Security issues via backend applications whose response headers are malicious or exploitable (CVE-2024-38476)\n\nA Red Hat Security Bulletin which addresses further details about this flaw is available in the References section.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:5239", "url": "https://access.redhat.com/errata/RHSA-2024:5239" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_core_services/2.4.57/html/red_hat_jboss_core_services_apache_http_server_2.4.57_service_pack_5_release_notes/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_core_services/2.4.57/html/red_hat_jboss_core_services_apache_http_server_2.4.57_service_pack_5_release_notes/index" }, { "category": "external", "summary": "2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295015" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5239.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP5 security update", "tracking": { "current_release_date": "2025-01-09T06:23:09+00:00", "generator": { "date": "2025-01-09T06:23:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2024:5239", "initial_release_date": "2024-08-13T13:18:01+00:00", "revision_history": [ { "date": "2024-08-13T13:18:01+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-08-13T13:18:01+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-09T06:23:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product": { "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el7" } } }, { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 8", "product": { "name": "Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el8" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "product_id": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.57-13.el7jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "product_id": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.19-41.el7jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "product": { "name": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "product_id": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.49-11.redhat_1.el7jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "product": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "product_id": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster@1.3.20-8.el7jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.3-40.el7jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "product": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "product_id": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.4.24-11.el7jbcs?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "product_id": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.57-13.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "product_id": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.19-41.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "product_id": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.49-11.redhat_1.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "product_id": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster@1.3.20-8.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.3-40.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "product_id": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.4.24-11.el8jbcs?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.57-13.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.57-13.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.57-13.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.57-13.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.57-13.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.57-13.el7jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.57-13.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.57-13.el7jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.57-13.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.19-41.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.19-41.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.49-11.redhat_1.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.49-11.redhat_1.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster@1.3.20-8.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster-debuginfo@1.3.20-8.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.3-40.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.3-40.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.4.24-11.el7jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.4.24-11.el7jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.57-13.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.57-13.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools-debuginfo@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap-debuginfo@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html-debuginfo@2.4.57-13.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session-debuginfo@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl-debuginfo@2.4.57-13.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.19-41.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.19-41.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.49-11.redhat_1.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24-debuginfo@1.2.49-11.redhat_1.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster@1.3.20-8.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster-debuginfo@1.3.20-8.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.3-40.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.3-40.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.4.24-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.4.24-11.el8jbcs?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.57-13.el7jbcs?arch=noarch" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.57-13.el8jbcs?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src" }, "product_reference": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src" }, "product_reference": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src" }, "product_reference": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38473", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:36+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295012" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. Due to an encoding problem, specially crafted request URLs with incorrect encoding can be sent to backend services, potentially bypassing authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Encoding problem in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations where mechanisms other than ProxyPass/ProxyPassMatch or RewriteRule with the \u0027P\u0027 flag are used to configure a request to be proxied, such as SetHandler or inadvertent proxying via CVE-2024-39573. Note that these alternate mechanisms may be used within .htaccess files.\n\nFor more information about CVE-2024-39573, see https://access.redhat.com/security/cve/CVE-2024-39573.\n\nAdditionally, this flaw requires mod_proxy to be loaded and being used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38473" }, { "category": "external", "summary": "RHBZ#2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38473", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:18:01+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5239" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Encoding problem in mod_proxy" }, { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:18:01+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5239" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:18:01+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5239" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38476", "cwe": { "id": "CWE-829", "name": "Inclusion of Functionality from Untrusted Control Sphere" }, "discovery_date": "2024-07-01T19:22:16+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295015" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. Backend applications whose response headers are malicious or exploitable may allow information disclosure, server-side request forgery (SSRF) or local script execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Security issues via\u00a0backend applications whose response headers are malicious or exploitable", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw can only be exploited by backend applications via malicious or exploitable response headers. For this reason, this flaw was rated with an important and not critical severity.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38476" }, { "category": "external", "summary": "RHBZ#2295015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295015" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38476", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38476" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38476", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38476" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:18:01+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5239" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Security issues via\u00a0backend applications whose response headers are malicious or exploitable" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:18:01+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5239" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" }, { "cve": "CVE-2024-39573", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295022" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. A potential SSRF allows an attacker to cause unsafe rules used in the RewriteRule directive to unexpectedly set up URLs to be handled by the mod_proxy module.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Potential SSRF in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive.\n\nAdditionally, this flaw requires mod_rewrite and mod_proxy to be loaded and being used. These modules can be disabled via the configuration file if their functionality are not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-39573" }, { "category": "external", "summary": "RHBZ#2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-39573", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:18:01+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5239" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Potential SSRF in mod_rewrite" } ] }
rhsa-2024_4830
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4830", "url": "https://access.redhat.com/errata/RHSA-2024:4830" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4830.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2024-12-17T09:15:56+00:00", "generator": { "date": "2024-12-17T09:15:56+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:4830", "initial_release_date": "2024-07-24T14:05:13+00:00", "revision_history": [ { "date": "2024-07-24T14:05:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-24T14:05:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T09:15:56+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.4::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.4::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8040020240720035525:522a0ee4", "product": { "name": "httpd:2.4:8040020240720035525:522a0ee4", "product_id": "httpd:2.4:8040020240720035525:522a0ee4", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8040020240720035525:522a0ee4" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "product_id": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "product": { "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "product_id": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "product": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "product_id": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B21747%2B916a74df.3?arch=src" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B21747%2B916a74df.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B21747%2B916a74df.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B21747%2B916a74df.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B21747%2B916a74df.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B21747%2B916a74df.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B21747%2B916a74df.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, "product_reference": "httpd:2.4:8040020240720035525:522a0ee4", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch" }, "product_reference": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, "product_reference": "httpd:2.4:8040020240720035525:522a0ee4", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch" }, "product_reference": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, "product_reference": "httpd:2.4:8040020240720035525:522a0ee4", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch" }, "product_reference": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T14:05:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4830" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T14:05:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4830" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T14:05:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4830" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
RHSA-2024:5239
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 5 is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products and packaged under Red Hat JBoss Core Services, to allow for faster distribution of updates and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 5 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 4, and includes bug fixes and enhancements, which are documented in the Release Notes linked to in the References section.\n\nSecurity Fix(es):\n\n* jbcs-httpd24-httpd: Potential SSRF in mod_rewrite (CVE-2024-39573)\n* jbcs-httpd24-httpd: null pointer dereference in mod_proxy (CVE-2024-38477)\n* jbcs-httpd24-httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n* jbcs-httpd24-httpd: Encoding problem in mod_proxy (CVE-2024-38473)\n* jbcs-httpd24-httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n* jbcs-httpd24-httpd: Security issues via backend applications whose response headers are malicious or exploitable (CVE-2024-38476)\n\nA Red Hat Security Bulletin which addresses further details about this flaw is available in the References section.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:5239", "url": "https://access.redhat.com/errata/RHSA-2024:5239" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_core_services/2.4.57/html/red_hat_jboss_core_services_apache_http_server_2.4.57_service_pack_5_release_notes/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_core_services/2.4.57/html/red_hat_jboss_core_services_apache_http_server_2.4.57_service_pack_5_release_notes/index" }, { "category": "external", "summary": "2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295015" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5239.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP5 security update", "tracking": { "current_release_date": "2025-01-09T06:23:09+00:00", "generator": { "date": "2025-01-09T06:23:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2024:5239", "initial_release_date": "2024-08-13T13:18:01+00:00", "revision_history": [ { "date": "2024-08-13T13:18:01+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-08-13T13:18:01+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-09T06:23:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product": { "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el7" } } }, { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 8", "product": { "name": "Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el8" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "product_id": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.57-13.el7jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "product_id": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.19-41.el7jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "product": { "name": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "product_id": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.49-11.redhat_1.el7jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "product": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "product_id": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster@1.3.20-8.el7jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.3-40.el7jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "product": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "product_id": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.4.24-11.el7jbcs?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "product_id": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.57-13.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "product_id": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.19-41.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "product_id": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.49-11.redhat_1.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "product_id": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster@1.3.20-8.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.3-40.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "product_id": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.4.24-11.el8jbcs?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.57-13.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.57-13.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.57-13.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.57-13.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.57-13.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.57-13.el7jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.57-13.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.57-13.el7jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.57-13.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.19-41.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.19-41.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.49-11.redhat_1.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.49-11.redhat_1.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster@1.3.20-8.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster-debuginfo@1.3.20-8.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.3-40.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.3-40.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.4.24-11.el7jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.4.24-11.el7jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.57-13.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.57-13.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools-debuginfo@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap-debuginfo@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html-debuginfo@2.4.57-13.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session-debuginfo@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl-debuginfo@2.4.57-13.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.19-41.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.19-41.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.49-11.redhat_1.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24-debuginfo@1.2.49-11.redhat_1.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster@1.3.20-8.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster-debuginfo@1.3.20-8.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.3-40.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.3-40.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.4.24-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.4.24-11.el8jbcs?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.57-13.el7jbcs?arch=noarch" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.57-13.el8jbcs?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src" }, "product_reference": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src" }, "product_reference": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src" }, "product_reference": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38473", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:36+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295012" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. Due to an encoding problem, specially crafted request URLs with incorrect encoding can be sent to backend services, potentially bypassing authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Encoding problem in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations where mechanisms other than ProxyPass/ProxyPassMatch or RewriteRule with the \u0027P\u0027 flag are used to configure a request to be proxied, such as SetHandler or inadvertent proxying via CVE-2024-39573. Note that these alternate mechanisms may be used within .htaccess files.\n\nFor more information about CVE-2024-39573, see https://access.redhat.com/security/cve/CVE-2024-39573.\n\nAdditionally, this flaw requires mod_proxy to be loaded and being used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38473" }, { "category": "external", "summary": "RHBZ#2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38473", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:18:01+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5239" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Encoding problem in mod_proxy" }, { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:18:01+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5239" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:18:01+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5239" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38476", "cwe": { "id": "CWE-829", "name": "Inclusion of Functionality from Untrusted Control Sphere" }, "discovery_date": "2024-07-01T19:22:16+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295015" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. Backend applications whose response headers are malicious or exploitable may allow information disclosure, server-side request forgery (SSRF) or local script execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Security issues via\u00a0backend applications whose response headers are malicious or exploitable", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw can only be exploited by backend applications via malicious or exploitable response headers. For this reason, this flaw was rated with an important and not critical severity.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38476" }, { "category": "external", "summary": "RHBZ#2295015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295015" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38476", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38476" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38476", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38476" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:18:01+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5239" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Security issues via\u00a0backend applications whose response headers are malicious or exploitable" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:18:01+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5239" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" }, { "cve": "CVE-2024-39573", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295022" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. A potential SSRF allows an attacker to cause unsafe rules used in the RewriteRule directive to unexpectedly set up URLs to be handled by the mod_proxy module.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Potential SSRF in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive.\n\nAdditionally, this flaw requires mod_rewrite and mod_proxy to be loaded and being used. These modules can be disabled via the configuration file if their functionality are not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-39573" }, { "category": "external", "summary": "RHBZ#2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-39573", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:18:01+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5239" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Potential SSRF in mod_rewrite" } ] }
rhsa-2024_4820
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4820", "url": "https://access.redhat.com/errata/RHSA-2024:4820" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4820.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2024-12-17T09:16:07+00:00", "generator": { "date": "2024-12-17T09:16:07+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:4820", "initial_release_date": "2024-07-24T12:40:36+00:00", "revision_history": [ { "date": "2024-07-24T12:40:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-24T12:40:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T09:16:07+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8020020240720043142:4cda2c84", "product": { "name": "httpd:2.4:8020020240720043142:4cda2c84", "product_id": "httpd:2.4:8020020240720043142:4cda2c84", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8020020240720043142:4cda2c84" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "product_id": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "product": { "name": "httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "product_id": "httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "product": { "name": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "product_id": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "product_id": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B22123%2Bcf5a147c.4?arch=src" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "product": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "product_id": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product_id": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B22123%2Bcf5a147c.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.2.0%2B22123%2Bcf5a147c.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.2.0%2B22123%2Bcf5a147c.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_id": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_id": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_id": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, "product_reference": "httpd:2.4:8020020240720043142:4cda2c84", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src" }, "product_reference": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch" }, "product_reference": "httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src" }, "product_reference": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64" }, "product_reference": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T12:40:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4820" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T12:40:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4820" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T12:40:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4820" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
rhsa-2024:4827
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4827", "url": "https://access.redhat.com/errata/RHSA-2024:4827" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4827.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2025-01-09T06:22:21+00:00", "generator": { "date": "2025-01-09T06:22:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2024:4827", "initial_release_date": "2024-07-24T13:18:31+00:00", "revision_history": [ { "date": "2024-07-24T13:18:31+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-24T13:18:31+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-09T06:22:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.6::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.6::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.6::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8060020240719220036:ad008a3a", "product": { "name": "httpd:2.4:8060020240719220036:ad008a3a", "product_id": "httpd:2.4:8060020240719220036:ad008a3a", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8060020240719220036:ad008a3a" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "product_id": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "product": { "name": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "product_id": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "product": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "product_id": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "product": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "product_id": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=src" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product_id": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product_id": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product_id": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product_id": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product_id": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product_id": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product_id": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product_id": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product_id": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product_id": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product_id": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product_id": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, "product_reference": "httpd:2.4:8060020240719220036:ad008a3a", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch" }, "product_reference": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, "product_reference": "httpd:2.4:8060020240719220036:ad008a3a", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch" }, "product_reference": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x" }, "product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, "product_reference": "httpd:2.4:8060020240719220036:ad008a3a", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch" }, "product_reference": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T13:18:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4827" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T13:18:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4827" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T13:18:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4827" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
rhsa-2024_4720
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Encoding problem in mod_proxy (CVE-2024-38473)\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\n* httpd: Potential SSRF in mod_rewrite (CVE-2024-39573)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4720", "url": "https://access.redhat.com/errata/RHSA-2024:4720" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4720.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2024-12-17T09:15:08+00:00", "generator": { "date": "2024-12-17T09:15:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:4720", "initial_release_date": "2024-07-23T08:57:47+00:00", "revision_history": [ { "date": "2024-07-23T08:57:47+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-23T08:57:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T09:15:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8100020240712114234:489197e6", "product": { "name": "httpd:2.4:8100020240712114234:489197e6", "product_id": "httpd:2.4:8100020240712114234:489197e6", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8100020240712114234:489197e6" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "product_id": "httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "product": { "name": "httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "product_id": "httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "product": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "product_id": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "product": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "product_id": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=src" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "product": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "product_id": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product_id": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product_id": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product_id": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product_id": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product_id": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product_id": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product_id": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product_id": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product_id": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product_id": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product_id": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product_id": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product_id": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product_id": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product_id": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product_id": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, "product_reference": "httpd:2.4:8100020240712114234:489197e6", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src" }, "product_reference": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch" }, "product_reference": "httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64" }, "product_reference": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le" }, "product_reference": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x" }, "product_reference": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src" }, "product_reference": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64" }, "product_reference": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x" }, "product_reference": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38473", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:36+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295012" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. Due to an encoding problem, specially crafted request URLs with incorrect encoding can be sent to backend services, potentially bypassing authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Encoding problem in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations where mechanisms other than ProxyPass/ProxyPassMatch or RewriteRule with the \u0027P\u0027 flag are used to configure a request to be proxied, such as SetHandler or inadvertent proxying via CVE-2024-39573. Note that these alternate mechanisms may be used within .htaccess files.\n\nFor more information about CVE-2024-39573, see https://access.redhat.com/security/cve/CVE-2024-39573.\n\nAdditionally, this flaw requires mod_proxy to be loaded and being used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38473" }, { "category": "external", "summary": "RHBZ#2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38473", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:57:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4720" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Encoding problem in mod_proxy" }, { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:57:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4720" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:57:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4720" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:57:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4720" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" }, { "cve": "CVE-2024-39573", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295022" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. A potential SSRF allows an attacker to cause unsafe rules used in the RewriteRule directive to unexpectedly set up URLs to be handled by the mod_proxy module.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Potential SSRF in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive.\n\nAdditionally, this flaw requires mod_rewrite and mod_proxy to be loaded and being used. These modules can be disabled via the configuration file if their functionality are not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-39573" }, { "category": "external", "summary": "RHBZ#2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-39573", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:57:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4720" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Potential SSRF in mod_rewrite" } ] }
rhsa-2024_4938
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4938", "url": "https://access.redhat.com/errata/RHSA-2024:4938" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4938.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2024-12-17T09:16:42+00:00", "generator": { "date": "2024-12-17T09:16:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:4938", "initial_release_date": "2024-07-31T10:23:15+00:00", "revision_history": [ { "date": "2024-07-31T10:23:15+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-31T10:23:15+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T09:16:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-90.el7_7.4.src", "product": { "name": "httpd-0:2.4.6-90.el7_7.4.src", "product_id": "httpd-0:2.4.6-90.el7_7.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-90.el7_7.4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-90.el7_7.4.x86_64", "product": { "name": "httpd-0:2.4.6-90.el7_7.4.x86_64", "product_id": "httpd-0:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-90.el7_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "product": { "name": "httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "product_id": "httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-90.el7_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "product": { "name": "httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "product_id": "httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-90.el7_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-90.el7_7.4.x86_64", "product": { "name": "mod_session-0:2.4.6-90.el7_7.4.x86_64", "product_id": "mod_session-0:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-90.el7_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "product": { "name": "mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "product_id": "mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-90.el7_7.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "product_id": "httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-90.el7_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "product": { "name": "mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "product_id": "mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-90.el7_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "product": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "product_id": "mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-90.el7_7.4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.4.6-90.el7_7.4.noarch", "product": { "name": "httpd-manual-0:2.4.6-90.el7_7.4.noarch", "product_id": "httpd-manual-0:2.4.6-90.el7_7.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-90.el7_7.4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.4.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src" }, "product_reference": "httpd-0:2.4.6-90.el7_7.4.src", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-90.el7_7.4.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch" }, "product_reference": "httpd-manual-0:2.4.6-90.el7_7.4.noarch", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.4.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src" }, "product_reference": "httpd-0:2.4.6-90.el7_7.4.src", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-90.el7_7.4.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch" }, "product_reference": "httpd-manual-0:2.4.6-90.el7_7.4.noarch", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-31T10:23:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4938" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-31T10:23:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4938" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-31T10:23:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4938" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
rhsa-2024_4943
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4943", "url": "https://access.redhat.com/errata/RHSA-2024:4943" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4943.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2024-12-17T09:16:53+00:00", "generator": { "date": "2024-12-17T09:16:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:4943", "initial_release_date": "2024-07-31T14:59:20+00:00", "revision_history": [ { "date": "2024-07-31T14:59:20+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-31T14:59:20+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T09:16:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7 ELS)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-99.el7_9.2.src", "product": { "name": "httpd-0:2.4.6-99.el7_9.2.src", "product_id": "httpd-0:2.4.6-99.el7_9.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-99.el7_9.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-99.el7_9.2.x86_64", "product": { "name": "httpd-0:2.4.6-99.el7_9.2.x86_64", "product_id": "httpd-0:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-99.el7_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "product": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "product_id": "httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-99.el7_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "product": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "product_id": "httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-99.el7_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-99.el7_9.2.x86_64", "product": { "name": "mod_session-0:2.4.6-99.el7_9.2.x86_64", "product_id": "mod_session-0:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-99.el7_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "product": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "product_id": "mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-99.el7_9.2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "product_id": "httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-99.el7_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "product": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "product_id": "mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-99.el7_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "product": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "product_id": "mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-99.el7_9.2?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "httpd-0:2.4.6-99.el7_9.2.ppc64le", "product_id": "httpd-0:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-99.el7_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "product_id": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-99.el7_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "product_id": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-99.el7_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64le", "product_id": "mod_session-0:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-99.el7_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "product_id": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-99.el7_9.2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "product_id": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-99.el7_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "product_id": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-99.el7_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "product_id": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-99.el7_9.2?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-99.el7_9.2.ppc64", "product": { "name": "httpd-0:2.4.6-99.el7_9.2.ppc64", "product_id": "httpd-0:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-99.el7_9.2?arch=ppc64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "product": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "product_id": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-99.el7_9.2?arch=ppc64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "product": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "product_id": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-99.el7_9.2?arch=ppc64" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64", "product": { "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64", "product_id": "mod_session-0:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-99.el7_9.2?arch=ppc64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "product": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "product_id": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-99.el7_9.2?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "product": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "product_id": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-99.el7_9.2?arch=ppc64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "product": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "product_id": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-99.el7_9.2?arch=ppc64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "product": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "product_id": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-99.el7_9.2?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-99.el7_9.2.s390x", "product": { "name": "httpd-0:2.4.6-99.el7_9.2.s390x", "product_id": "httpd-0:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-99.el7_9.2?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-99.el7_9.2.s390x", "product": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.s390x", "product_id": "httpd-devel-0:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-99.el7_9.2?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-99.el7_9.2.s390x", "product": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.s390x", "product_id": "httpd-tools-0:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-99.el7_9.2?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-99.el7_9.2.s390x", "product": { "name": "mod_session-0:2.4.6-99.el7_9.2.s390x", "product_id": "mod_session-0:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-99.el7_9.2?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-99.el7_9.2.s390x", "product": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.s390x", "product_id": "mod_ssl-1:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-99.el7_9.2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "product": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "product_id": "httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-99.el7_9.2?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-99.el7_9.2.s390x", "product": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.s390x", "product_id": "mod_ldap-0:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-99.el7_9.2?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "product": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "product_id": "mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-99.el7_9.2?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.4.6-99.el7_9.2.noarch", "product": { "name": "httpd-manual-0:2.4.6-99.el7_9.2.noarch", "product_id": "httpd-manual-0:2.4.6-99.el7_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-99.el7_9.2?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.src as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.src", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-99.el7_9.2.noarch as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch" }, "product_reference": "httpd-manual-0:2.4.6-99.el7_9.2.noarch", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.src", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-99.el7_9.2.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch" }, "product_reference": "httpd-manual-0:2.4.6-99.el7_9.2.noarch", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-31T14:59:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4943" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-31T14:59:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4943" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-31T14:59:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4943" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
RHSA-2024:4726
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: null pointer dereference in mod_proxy (CVE-2024-38477)\n\n* httpd: Potential SSRF in mod_rewrite (CVE-2024-39573)\n\n* httpd: Encoding problem in mod_proxy (CVE-2024-38473)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4726", "url": "https://access.redhat.com/errata/RHSA-2024:4726" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4726.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2025-01-09T06:23:15+00:00", "generator": { "date": "2025-01-09T06:23:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2024:4726", "initial_release_date": "2024-07-23T13:24:43+00:00", "revision_history": [ { "date": "2024-07-23T13:24:43+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-23T13:24:43+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-09T06:23:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.57-11.el9_4.src", "product": { "name": "httpd-0:2.4.57-11.el9_4.src", "product_id": "httpd-0:2.4.57-11.el9_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.57-11.el9_4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-core-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-core-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-devel-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-devel-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-tools-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-tools-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_ldap-0:2.4.57-11.el9_4.aarch64", "product_id": "mod_ldap-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_lua-0:2.4.57-11.el9_4.aarch64", "product_id": "mod_lua-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "product_id": "mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.57-11.el9_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_session-0:2.4.57-11.el9_4.aarch64", "product_id": "mod_session-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_ssl-1:2.4.57-11.el9_4.aarch64", "product_id": "mod_ssl-1:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.57-11.el9_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_id": "mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.57-11.el9_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_id": "mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.57-11.el9_4?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-core-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-core-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-devel-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-devel-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-tools-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-tools-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_ldap-0:2.4.57-11.el9_4.ppc64le", "product_id": "mod_ldap-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_lua-0:2.4.57-11.el9_4.ppc64le", "product_id": "mod_lua-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "product_id": "mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.57-11.el9_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_session-0:2.4.57-11.el9_4.ppc64le", "product_id": "mod_session-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_ssl-1:2.4.57-11.el9_4.ppc64le", "product_id": "mod_ssl-1:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.57-11.el9_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_id": "mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.57-11.el9_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.57-11.el9_4?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-core-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-core-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-devel-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-devel-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-tools-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-tools-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_ldap-0:2.4.57-11.el9_4.x86_64", "product_id": "mod_ldap-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_lua-0:2.4.57-11.el9_4.x86_64", "product_id": "mod_lua-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "product_id": "mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.57-11.el9_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_session-0:2.4.57-11.el9_4.x86_64", "product_id": "mod_session-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_ssl-1:2.4.57-11.el9_4.x86_64", "product_id": "mod_ssl-1:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.57-11.el9_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_id": "mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.57-11.el9_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_id": "mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.57-11.el9_4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-core-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-core-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-devel-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-devel-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-tools-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-tools-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.57-11.el9_4.s390x", "product": { "name": "mod_ldap-0:2.4.57-11.el9_4.s390x", "product_id": "mod_ldap-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.57-11.el9_4.s390x", "product": { "name": "mod_lua-0:2.4.57-11.el9_4.s390x", "product_id": "mod_lua-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.57-11.el9_4.s390x", "product": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.s390x", "product_id": "mod_proxy_html-1:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.57-11.el9_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.57-11.el9_4.s390x", "product": { "name": "mod_session-0:2.4.57-11.el9_4.s390x", "product_id": "mod_session-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.57-11.el9_4.s390x", "product": { "name": "mod_ssl-1:2.4.57-11.el9_4.s390x", "product_id": "mod_ssl-1:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.57-11.el9_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-debugsource-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "product": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "product_id": "mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.57-11.el9_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "product_id": "mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.57-11.el9_4?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-filesystem-0:2.4.57-11.el9_4.noarch", "product": { "name": "httpd-filesystem-0:2.4.57-11.el9_4.noarch", "product_id": "httpd-filesystem-0:2.4.57-11.el9_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.57-11.el9_4?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.57-11.el9_4.noarch", "product": { "name": "httpd-manual-0:2.4.57-11.el9_4.noarch", "product_id": "httpd-manual-0:2.4.57-11.el9_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.57-11.el9_4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.57-11.el9_4.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src" }, "product_reference": "httpd-0:2.4.57-11.el9_4.src", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-core-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-core-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-core-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-core-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-debugsource-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-devel-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-devel-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-devel-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-devel-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.57-11.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch" }, "product_reference": "httpd-filesystem-0:2.4.57-11.el9_4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.57-11.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch" }, "product_reference": "httpd-manual-0:2.4.57-11.el9_4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-tools-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-tools-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-tools-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-tools-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_ldap-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_ldap-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_ldap-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_ldap-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_lua-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_lua-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_lua-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_lua-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_proxy_html-1:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_session-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_session-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_session-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_session-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_ssl-1:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_ssl-1:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_ssl-1:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_ssl-1:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38473", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:36+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295012" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. Due to an encoding problem, specially crafted request URLs with incorrect encoding can be sent to backend services, potentially bypassing authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Encoding problem in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations where mechanisms other than ProxyPass/ProxyPassMatch or RewriteRule with the \u0027P\u0027 flag are used to configure a request to be proxied, such as SetHandler or inadvertent proxying via CVE-2024-39573. Note that these alternate mechanisms may be used within .htaccess files.\n\nFor more information about CVE-2024-39573, see https://access.redhat.com/security/cve/CVE-2024-39573.\n\nAdditionally, this flaw requires mod_proxy to be loaded and being used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38473" }, { "category": "external", "summary": "RHBZ#2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38473", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T13:24:43+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4726" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Encoding problem in mod_proxy" }, { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T13:24:43+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4726" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T13:24:43+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4726" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T13:24:43+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4726" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" }, { "cve": "CVE-2024-39573", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295022" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. A potential SSRF allows an attacker to cause unsafe rules used in the RewriteRule directive to unexpectedly set up URLs to be handled by the mod_proxy module.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Potential SSRF in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive.\n\nAdditionally, this flaw requires mod_rewrite and mod_proxy to be loaded and being used. These modules can be disabled via the configuration file if their functionality are not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-39573" }, { "category": "external", "summary": "RHBZ#2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-39573", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T13:24:43+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4726" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Potential SSRF in mod_rewrite" } ] }
RHSA-2024:4830
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4830", "url": "https://access.redhat.com/errata/RHSA-2024:4830" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4830.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2025-01-09T06:22:34+00:00", "generator": { "date": "2025-01-09T06:22:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2024:4830", "initial_release_date": "2024-07-24T14:05:13+00:00", "revision_history": [ { "date": "2024-07-24T14:05:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-24T14:05:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-09T06:22:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.4::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.4::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8040020240720035525:522a0ee4", "product": { "name": "httpd:2.4:8040020240720035525:522a0ee4", "product_id": "httpd:2.4:8040020240720035525:522a0ee4", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8040020240720035525:522a0ee4" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "product_id": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "product": { "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "product_id": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "product": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "product_id": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B21747%2B916a74df.3?arch=src" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B21747%2B916a74df.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B21747%2B916a74df.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B21747%2B916a74df.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B21747%2B916a74df.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B21747%2B916a74df.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B21747%2B916a74df.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, "product_reference": "httpd:2.4:8040020240720035525:522a0ee4", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch" }, "product_reference": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, "product_reference": "httpd:2.4:8040020240720035525:522a0ee4", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch" }, "product_reference": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, "product_reference": "httpd:2.4:8040020240720035525:522a0ee4", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch" }, "product_reference": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T14:05:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4830" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T14:05:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4830" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T14:05:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4830" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
RHSA-2024:4938
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4938", "url": "https://access.redhat.com/errata/RHSA-2024:4938" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4938.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2025-01-09T06:23:16+00:00", "generator": { "date": "2025-01-09T06:23:16+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2024:4938", "initial_release_date": "2024-07-31T10:23:15+00:00", "revision_history": [ { "date": "2024-07-31T10:23:15+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-31T10:23:15+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-09T06:23:16+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-90.el7_7.4.src", "product": { "name": "httpd-0:2.4.6-90.el7_7.4.src", "product_id": "httpd-0:2.4.6-90.el7_7.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-90.el7_7.4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-90.el7_7.4.x86_64", "product": { "name": "httpd-0:2.4.6-90.el7_7.4.x86_64", "product_id": "httpd-0:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-90.el7_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "product": { "name": "httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "product_id": "httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-90.el7_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "product": { "name": "httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "product_id": "httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-90.el7_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-90.el7_7.4.x86_64", "product": { "name": "mod_session-0:2.4.6-90.el7_7.4.x86_64", "product_id": "mod_session-0:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-90.el7_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "product": { "name": "mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "product_id": "mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-90.el7_7.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "product_id": "httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-90.el7_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "product": { "name": "mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "product_id": "mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-90.el7_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "product": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "product_id": "mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-90.el7_7.4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.4.6-90.el7_7.4.noarch", "product": { "name": "httpd-manual-0:2.4.6-90.el7_7.4.noarch", "product_id": "httpd-manual-0:2.4.6-90.el7_7.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-90.el7_7.4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.4.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src" }, "product_reference": "httpd-0:2.4.6-90.el7_7.4.src", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-90.el7_7.4.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch" }, "product_reference": "httpd-manual-0:2.4.6-90.el7_7.4.noarch", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.4.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src" }, "product_reference": "httpd-0:2.4.6-90.el7_7.4.src", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-90.el7_7.4.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch" }, "product_reference": "httpd-manual-0:2.4.6-90.el7_7.4.noarch", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-31T10:23:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4938" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-31T10:23:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4938" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-31T10:23:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4938" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
rhsa-2024:4726
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: null pointer dereference in mod_proxy (CVE-2024-38477)\n\n* httpd: Potential SSRF in mod_rewrite (CVE-2024-39573)\n\n* httpd: Encoding problem in mod_proxy (CVE-2024-38473)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4726", "url": "https://access.redhat.com/errata/RHSA-2024:4726" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4726.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2025-01-09T06:23:15+00:00", "generator": { "date": "2025-01-09T06:23:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2024:4726", "initial_release_date": "2024-07-23T13:24:43+00:00", "revision_history": [ { "date": "2024-07-23T13:24:43+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-23T13:24:43+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-09T06:23:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.57-11.el9_4.src", "product": { "name": "httpd-0:2.4.57-11.el9_4.src", "product_id": "httpd-0:2.4.57-11.el9_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.57-11.el9_4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-core-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-core-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-devel-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-devel-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-tools-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-tools-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_ldap-0:2.4.57-11.el9_4.aarch64", "product_id": "mod_ldap-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_lua-0:2.4.57-11.el9_4.aarch64", "product_id": "mod_lua-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "product_id": "mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.57-11.el9_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_session-0:2.4.57-11.el9_4.aarch64", "product_id": "mod_session-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_ssl-1:2.4.57-11.el9_4.aarch64", "product_id": "mod_ssl-1:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.57-11.el9_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_id": "mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.57-11.el9_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_id": "mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.57-11.el9_4?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-core-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-core-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-devel-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-devel-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-tools-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-tools-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_ldap-0:2.4.57-11.el9_4.ppc64le", "product_id": "mod_ldap-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_lua-0:2.4.57-11.el9_4.ppc64le", "product_id": "mod_lua-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "product_id": "mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.57-11.el9_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_session-0:2.4.57-11.el9_4.ppc64le", "product_id": "mod_session-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_ssl-1:2.4.57-11.el9_4.ppc64le", "product_id": "mod_ssl-1:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.57-11.el9_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_id": "mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.57-11.el9_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.57-11.el9_4?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-core-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-core-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-devel-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-devel-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-tools-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-tools-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_ldap-0:2.4.57-11.el9_4.x86_64", "product_id": "mod_ldap-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_lua-0:2.4.57-11.el9_4.x86_64", "product_id": "mod_lua-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "product_id": "mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.57-11.el9_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_session-0:2.4.57-11.el9_4.x86_64", "product_id": "mod_session-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_ssl-1:2.4.57-11.el9_4.x86_64", "product_id": "mod_ssl-1:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.57-11.el9_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_id": "mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.57-11.el9_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_id": "mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.57-11.el9_4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-core-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-core-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-devel-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-devel-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-tools-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-tools-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.57-11.el9_4.s390x", "product": { "name": "mod_ldap-0:2.4.57-11.el9_4.s390x", "product_id": "mod_ldap-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.57-11.el9_4.s390x", "product": { "name": "mod_lua-0:2.4.57-11.el9_4.s390x", "product_id": "mod_lua-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.57-11.el9_4.s390x", "product": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.s390x", "product_id": "mod_proxy_html-1:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.57-11.el9_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.57-11.el9_4.s390x", "product": { "name": "mod_session-0:2.4.57-11.el9_4.s390x", "product_id": "mod_session-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.57-11.el9_4.s390x", "product": { "name": "mod_ssl-1:2.4.57-11.el9_4.s390x", "product_id": "mod_ssl-1:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.57-11.el9_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-debugsource-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "product": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "product_id": "mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.57-11.el9_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "product_id": "mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.57-11.el9_4?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-filesystem-0:2.4.57-11.el9_4.noarch", "product": { "name": "httpd-filesystem-0:2.4.57-11.el9_4.noarch", "product_id": "httpd-filesystem-0:2.4.57-11.el9_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.57-11.el9_4?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.57-11.el9_4.noarch", "product": { "name": "httpd-manual-0:2.4.57-11.el9_4.noarch", "product_id": "httpd-manual-0:2.4.57-11.el9_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.57-11.el9_4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.57-11.el9_4.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src" }, "product_reference": "httpd-0:2.4.57-11.el9_4.src", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-core-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-core-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-core-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-core-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-debugsource-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-devel-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-devel-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-devel-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-devel-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.57-11.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch" }, "product_reference": "httpd-filesystem-0:2.4.57-11.el9_4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.57-11.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch" }, "product_reference": "httpd-manual-0:2.4.57-11.el9_4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-tools-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-tools-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-tools-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-tools-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_ldap-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_ldap-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_ldap-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_ldap-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_lua-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_lua-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_lua-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_lua-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_proxy_html-1:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_session-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_session-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_session-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_session-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_ssl-1:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_ssl-1:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_ssl-1:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_ssl-1:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38473", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:36+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295012" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. Due to an encoding problem, specially crafted request URLs with incorrect encoding can be sent to backend services, potentially bypassing authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Encoding problem in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations where mechanisms other than ProxyPass/ProxyPassMatch or RewriteRule with the \u0027P\u0027 flag are used to configure a request to be proxied, such as SetHandler or inadvertent proxying via CVE-2024-39573. Note that these alternate mechanisms may be used within .htaccess files.\n\nFor more information about CVE-2024-39573, see https://access.redhat.com/security/cve/CVE-2024-39573.\n\nAdditionally, this flaw requires mod_proxy to be loaded and being used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38473" }, { "category": "external", "summary": "RHBZ#2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38473", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T13:24:43+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4726" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Encoding problem in mod_proxy" }, { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T13:24:43+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4726" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T13:24:43+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4726" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T13:24:43+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4726" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" }, { "cve": "CVE-2024-39573", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295022" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. A potential SSRF allows an attacker to cause unsafe rules used in the RewriteRule directive to unexpectedly set up URLs to be handled by the mod_proxy module.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Potential SSRF in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive.\n\nAdditionally, this flaw requires mod_rewrite and mod_proxy to be loaded and being used. These modules can be disabled via the configuration file if their functionality are not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-39573" }, { "category": "external", "summary": "RHBZ#2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-39573", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T13:24:43+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4726" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Potential SSRF in mod_rewrite" } ] }
rhsa-2024:4820
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4820", "url": "https://access.redhat.com/errata/RHSA-2024:4820" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4820.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2025-01-09T06:22:44+00:00", "generator": { "date": "2025-01-09T06:22:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2024:4820", "initial_release_date": "2024-07-24T12:40:36+00:00", "revision_history": [ { "date": "2024-07-24T12:40:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-24T12:40:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-09T06:22:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8020020240720043142:4cda2c84", "product": { "name": "httpd:2.4:8020020240720043142:4cda2c84", "product_id": "httpd:2.4:8020020240720043142:4cda2c84", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8020020240720043142:4cda2c84" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "product_id": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "product": { "name": "httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "product_id": "httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "product": { "name": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "product_id": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "product_id": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B22123%2Bcf5a147c.4?arch=src" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "product": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "product_id": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product_id": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B22123%2Bcf5a147c.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.2.0%2B22123%2Bcf5a147c.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.2.0%2B22123%2Bcf5a147c.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_id": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_id": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_id": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, "product_reference": "httpd:2.4:8020020240720043142:4cda2c84", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src" }, "product_reference": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch" }, "product_reference": "httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src" }, "product_reference": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64" }, "product_reference": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T12:40:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4820" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T12:40:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4820" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T12:40:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4820" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
rhsa-2024_4726
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: null pointer dereference in mod_proxy (CVE-2024-38477)\n\n* httpd: Potential SSRF in mod_rewrite (CVE-2024-39573)\n\n* httpd: Encoding problem in mod_proxy (CVE-2024-38473)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4726", "url": "https://access.redhat.com/errata/RHSA-2024:4726" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4726.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2024-12-17T09:15:21+00:00", "generator": { "date": "2024-12-17T09:15:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:4726", "initial_release_date": "2024-07-23T13:24:43+00:00", "revision_history": [ { "date": "2024-07-23T13:24:43+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-23T13:24:43+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T09:15:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.57-11.el9_4.src", "product": { "name": "httpd-0:2.4.57-11.el9_4.src", "product_id": "httpd-0:2.4.57-11.el9_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.57-11.el9_4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-core-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-core-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-devel-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-devel-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-tools-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-tools-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_ldap-0:2.4.57-11.el9_4.aarch64", "product_id": "mod_ldap-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_lua-0:2.4.57-11.el9_4.aarch64", "product_id": "mod_lua-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "product_id": "mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.57-11.el9_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_session-0:2.4.57-11.el9_4.aarch64", "product_id": "mod_session-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_ssl-1:2.4.57-11.el9_4.aarch64", "product_id": "mod_ssl-1:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.57-11.el9_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_id": "mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.57-11.el9_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_id": "mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.57-11.el9_4?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-core-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-core-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-devel-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-devel-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-tools-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-tools-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_ldap-0:2.4.57-11.el9_4.ppc64le", "product_id": "mod_ldap-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_lua-0:2.4.57-11.el9_4.ppc64le", "product_id": "mod_lua-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "product_id": "mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.57-11.el9_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_session-0:2.4.57-11.el9_4.ppc64le", "product_id": "mod_session-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_ssl-1:2.4.57-11.el9_4.ppc64le", "product_id": "mod_ssl-1:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.57-11.el9_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_id": "mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.57-11.el9_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.57-11.el9_4?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-core-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-core-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-devel-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-devel-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-tools-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-tools-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_ldap-0:2.4.57-11.el9_4.x86_64", "product_id": "mod_ldap-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_lua-0:2.4.57-11.el9_4.x86_64", "product_id": "mod_lua-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "product_id": "mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.57-11.el9_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_session-0:2.4.57-11.el9_4.x86_64", "product_id": "mod_session-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_ssl-1:2.4.57-11.el9_4.x86_64", "product_id": "mod_ssl-1:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.57-11.el9_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_id": "mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.57-11.el9_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_id": "mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.57-11.el9_4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-core-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-core-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-devel-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-devel-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-tools-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-tools-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.57-11.el9_4.s390x", "product": { "name": "mod_ldap-0:2.4.57-11.el9_4.s390x", "product_id": "mod_ldap-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.57-11.el9_4.s390x", "product": { "name": "mod_lua-0:2.4.57-11.el9_4.s390x", "product_id": "mod_lua-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.57-11.el9_4.s390x", "product": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.s390x", "product_id": "mod_proxy_html-1:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.57-11.el9_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.57-11.el9_4.s390x", "product": { "name": "mod_session-0:2.4.57-11.el9_4.s390x", "product_id": "mod_session-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.57-11.el9_4.s390x", "product": { "name": "mod_ssl-1:2.4.57-11.el9_4.s390x", "product_id": "mod_ssl-1:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.57-11.el9_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-debugsource-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "product": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "product_id": "mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.57-11.el9_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "product_id": "mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.57-11.el9_4?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-filesystem-0:2.4.57-11.el9_4.noarch", "product": { "name": "httpd-filesystem-0:2.4.57-11.el9_4.noarch", "product_id": "httpd-filesystem-0:2.4.57-11.el9_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.57-11.el9_4?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.57-11.el9_4.noarch", "product": { "name": "httpd-manual-0:2.4.57-11.el9_4.noarch", "product_id": "httpd-manual-0:2.4.57-11.el9_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.57-11.el9_4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.57-11.el9_4.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src" }, "product_reference": "httpd-0:2.4.57-11.el9_4.src", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-core-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-core-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-core-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-core-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-debugsource-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-devel-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-devel-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-devel-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-devel-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.57-11.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch" }, "product_reference": "httpd-filesystem-0:2.4.57-11.el9_4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.57-11.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch" }, "product_reference": "httpd-manual-0:2.4.57-11.el9_4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-tools-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-tools-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-tools-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-tools-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_ldap-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_ldap-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_ldap-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_ldap-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_lua-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_lua-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_lua-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_lua-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_proxy_html-1:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_session-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_session-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_session-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_session-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_ssl-1:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_ssl-1:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_ssl-1:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_ssl-1:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38473", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:36+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295012" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. Due to an encoding problem, specially crafted request URLs with incorrect encoding can be sent to backend services, potentially bypassing authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Encoding problem in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations where mechanisms other than ProxyPass/ProxyPassMatch or RewriteRule with the \u0027P\u0027 flag are used to configure a request to be proxied, such as SetHandler or inadvertent proxying via CVE-2024-39573. Note that these alternate mechanisms may be used within .htaccess files.\n\nFor more information about CVE-2024-39573, see https://access.redhat.com/security/cve/CVE-2024-39573.\n\nAdditionally, this flaw requires mod_proxy to be loaded and being used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38473" }, { "category": "external", "summary": "RHBZ#2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38473", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T13:24:43+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4726" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Encoding problem in mod_proxy" }, { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T13:24:43+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4726" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T13:24:43+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4726" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T13:24:43+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4726" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" }, { "cve": "CVE-2024-39573", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295022" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. A potential SSRF allows an attacker to cause unsafe rules used in the RewriteRule directive to unexpectedly set up URLs to be handled by the mod_proxy module.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Potential SSRF in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive.\n\nAdditionally, this flaw requires mod_rewrite and mod_proxy to be loaded and being used. These modules can be disabled via the configuration file if their functionality are not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-39573" }, { "category": "external", "summary": "RHBZ#2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-39573", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T13:24:43+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4726" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Potential SSRF in mod_rewrite" } ] }
RHSA-2024:4863
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4863", "url": "https://access.redhat.com/errata/RHSA-2024:4863" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4863.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2025-01-09T06:23:06+00:00", "generator": { "date": "2025-01-09T06:23:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2024:4863", "initial_release_date": "2024-07-25T08:34:04+00:00", "revision_history": [ { "date": "2024-07-25T08:34:04+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-25T08:34:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-09T06:23:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.51-7.el9_0.7.src", "product": { "name": "httpd-0:2.4.51-7.el9_0.7.src", "product_id": "httpd-0:2.4.51-7.el9_0.7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.51-7.el9_0.7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "httpd-0:2.4.51-7.el9_0.7.aarch64", "product_id": "httpd-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "product_id": "httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "product_id": "httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_lua-0:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_lua-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.51-7.el9_0.7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_session-0:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_session-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.51-7.el9_0.7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "product_id": "httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_id": "httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.51-7.el9_0.7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.51-7.el9_0.7?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "httpd-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "httpd-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.51-7.el9_0.7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_session-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_session-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.51-7.el9_0.7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.51-7.el9_0.7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.51-7.el9_0.7?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "httpd-0:2.4.51-7.el9_0.7.x86_64", "product_id": "httpd-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "product_id": "httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "product_id": "httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_lua-0:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_lua-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.51-7.el9_0.7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_session-0:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_session-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.51-7.el9_0.7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "product_id": "httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_id": "httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.51-7.el9_0.7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.51-7.el9_0.7?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "httpd-0:2.4.51-7.el9_0.7.s390x", "product_id": "httpd-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.s390x", "product_id": "httpd-devel-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.s390x", "product_id": "httpd-tools-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.s390x", "product_id": "mod_ldap-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_lua-0:2.4.51-7.el9_0.7.s390x", "product_id": "mod_lua-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "product_id": "mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.51-7.el9_0.7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_session-0:2.4.51-7.el9_0.7.s390x", "product_id": "mod_session-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.s390x", "product_id": "mod_ssl-1:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.51-7.el9_0.7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "product_id": "httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_id": "httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_id": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.51-7.el9_0.7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_id": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.51-7.el9_0.7?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "product": { "name": "httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "product_id": "httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.51-7.el9_0.7?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.51-7.el9_0.7.noarch", "product": { "name": "httpd-manual-0:2.4.51-7.el9_0.7.noarch", "product_id": "httpd-manual-0:2.4.51-7.el9_0.7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.51-7.el9_0.7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "httpd-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "httpd-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "httpd-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.51-7.el9_0.7.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src" }, "product_reference": "httpd-0:2.4.51-7.el9_0.7.src", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "httpd-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "httpd-devel-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.51-7.el9_0.7.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch" }, "product_reference": "httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.51-7.el9_0.7.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch" }, "product_reference": "httpd-manual-0:2.4.51-7.el9_0.7.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "httpd-tools-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_ldap-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_lua-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_lua-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_lua-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_session-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_session-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_session-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_session-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_ssl-1:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-25T08:34:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4863" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-25T08:34:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4863" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-25T08:34:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4863" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
rhsa-2024:4938
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4938", "url": "https://access.redhat.com/errata/RHSA-2024:4938" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4938.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2025-01-09T06:23:16+00:00", "generator": { "date": "2025-01-09T06:23:16+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2024:4938", "initial_release_date": "2024-07-31T10:23:15+00:00", "revision_history": [ { "date": "2024-07-31T10:23:15+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-31T10:23:15+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-09T06:23:16+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-90.el7_7.4.src", "product": { "name": "httpd-0:2.4.6-90.el7_7.4.src", "product_id": "httpd-0:2.4.6-90.el7_7.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-90.el7_7.4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-90.el7_7.4.x86_64", "product": { "name": "httpd-0:2.4.6-90.el7_7.4.x86_64", "product_id": "httpd-0:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-90.el7_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "product": { "name": "httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "product_id": "httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-90.el7_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "product": { "name": "httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "product_id": "httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-90.el7_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-90.el7_7.4.x86_64", "product": { "name": "mod_session-0:2.4.6-90.el7_7.4.x86_64", "product_id": "mod_session-0:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-90.el7_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "product": { "name": "mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "product_id": "mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-90.el7_7.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "product_id": "httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-90.el7_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "product": { "name": "mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "product_id": "mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-90.el7_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "product": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "product_id": "mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-90.el7_7.4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.4.6-90.el7_7.4.noarch", "product": { "name": "httpd-manual-0:2.4.6-90.el7_7.4.noarch", "product_id": "httpd-manual-0:2.4.6-90.el7_7.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-90.el7_7.4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.4.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src" }, "product_reference": "httpd-0:2.4.6-90.el7_7.4.src", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-90.el7_7.4.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch" }, "product_reference": "httpd-manual-0:2.4.6-90.el7_7.4.noarch", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.4.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src" }, "product_reference": "httpd-0:2.4.6-90.el7_7.4.src", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-90.el7_7.4.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch" }, "product_reference": "httpd-manual-0:2.4.6-90.el7_7.4.noarch", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-31T10:23:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4938" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-31T10:23:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4938" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-31T10:23:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4938" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
rhsa-2024:4719
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4719", "url": "https://access.redhat.com/errata/RHSA-2024:4719" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4719.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2025-01-09T06:23:25+00:00", "generator": { "date": "2025-01-09T06:23:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2024:4719", "initial_release_date": "2024-07-23T08:59:27+00:00", "revision_history": [ { "date": "2024-07-23T08:59:27+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-23T08:59:27+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-09T06:23:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8080020240717184413:63b34585", "product": { "name": "httpd:2.4:8080020240717184413:63b34585", "product_id": "httpd:2.4:8080020240717184413:63b34585", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8080020240717184413:63b34585" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "product_id": "httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "product": { "name": "httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "product_id": "httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "product": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "product_id": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "product": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "product_id": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=src" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product_id": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product_id": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product_id": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product_id": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product_id": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product_id": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product_id": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product_id": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product_id": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product_id": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product_id": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product_id": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, "product_reference": "httpd:2.4:8080020240717184413:63b34585", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src" }, "product_reference": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch" }, "product_reference": "httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64" }, "product_reference": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le" }, "product_reference": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x" }, "product_reference": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src" }, "product_reference": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64" }, "product_reference": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x" }, "product_reference": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:59:27+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4719" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:59:27+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4719" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:59:27+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4719" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
rhsa-2024_4719
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4719", "url": "https://access.redhat.com/errata/RHSA-2024:4719" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4719.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2024-12-17T09:15:32+00:00", "generator": { "date": "2024-12-17T09:15:32+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:4719", "initial_release_date": "2024-07-23T08:59:27+00:00", "revision_history": [ { "date": "2024-07-23T08:59:27+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-23T08:59:27+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T09:15:32+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8080020240717184413:63b34585", "product": { "name": "httpd:2.4:8080020240717184413:63b34585", "product_id": "httpd:2.4:8080020240717184413:63b34585", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8080020240717184413:63b34585" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "product_id": "httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "product": { "name": "httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "product_id": "httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "product": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "product_id": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "product": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "product_id": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=src" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product_id": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product_id": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product_id": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product_id": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product_id": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product_id": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product_id": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product_id": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product_id": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product_id": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product_id": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product_id": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, "product_reference": "httpd:2.4:8080020240717184413:63b34585", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src" }, "product_reference": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch" }, "product_reference": "httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64" }, "product_reference": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le" }, "product_reference": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x" }, "product_reference": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src" }, "product_reference": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64" }, "product_reference": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x" }, "product_reference": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:59:27+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4719" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:59:27+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4719" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:59:27+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4719" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
rhsa-2024:4943
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4943", "url": "https://access.redhat.com/errata/RHSA-2024:4943" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4943.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2025-01-09T06:23:25+00:00", "generator": { "date": "2025-01-09T06:23:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2024:4943", "initial_release_date": "2024-07-31T14:59:20+00:00", "revision_history": [ { "date": "2024-07-31T14:59:20+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-31T14:59:20+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-09T06:23:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7 ELS)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-99.el7_9.2.src", "product": { "name": "httpd-0:2.4.6-99.el7_9.2.src", "product_id": "httpd-0:2.4.6-99.el7_9.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-99.el7_9.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-99.el7_9.2.x86_64", "product": { "name": "httpd-0:2.4.6-99.el7_9.2.x86_64", "product_id": "httpd-0:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-99.el7_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "product": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "product_id": "httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-99.el7_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "product": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "product_id": "httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-99.el7_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-99.el7_9.2.x86_64", "product": { "name": "mod_session-0:2.4.6-99.el7_9.2.x86_64", "product_id": "mod_session-0:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-99.el7_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "product": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "product_id": "mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-99.el7_9.2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "product_id": "httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-99.el7_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "product": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "product_id": "mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-99.el7_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "product": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "product_id": "mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-99.el7_9.2?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "httpd-0:2.4.6-99.el7_9.2.ppc64le", "product_id": "httpd-0:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-99.el7_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "product_id": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-99.el7_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "product_id": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-99.el7_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64le", "product_id": "mod_session-0:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-99.el7_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "product_id": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-99.el7_9.2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "product_id": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-99.el7_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "product_id": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-99.el7_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "product_id": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-99.el7_9.2?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-99.el7_9.2.ppc64", "product": { "name": "httpd-0:2.4.6-99.el7_9.2.ppc64", "product_id": "httpd-0:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-99.el7_9.2?arch=ppc64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "product": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "product_id": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-99.el7_9.2?arch=ppc64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "product": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "product_id": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-99.el7_9.2?arch=ppc64" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64", "product": { "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64", "product_id": "mod_session-0:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-99.el7_9.2?arch=ppc64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "product": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "product_id": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-99.el7_9.2?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "product": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "product_id": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-99.el7_9.2?arch=ppc64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "product": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "product_id": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-99.el7_9.2?arch=ppc64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "product": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "product_id": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-99.el7_9.2?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-99.el7_9.2.s390x", "product": { "name": "httpd-0:2.4.6-99.el7_9.2.s390x", "product_id": "httpd-0:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-99.el7_9.2?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-99.el7_9.2.s390x", "product": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.s390x", "product_id": "httpd-devel-0:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-99.el7_9.2?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-99.el7_9.2.s390x", "product": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.s390x", "product_id": "httpd-tools-0:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-99.el7_9.2?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-99.el7_9.2.s390x", "product": { "name": "mod_session-0:2.4.6-99.el7_9.2.s390x", "product_id": "mod_session-0:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-99.el7_9.2?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-99.el7_9.2.s390x", "product": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.s390x", "product_id": "mod_ssl-1:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-99.el7_9.2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "product": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "product_id": "httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-99.el7_9.2?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-99.el7_9.2.s390x", "product": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.s390x", "product_id": "mod_ldap-0:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-99.el7_9.2?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "product": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "product_id": "mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-99.el7_9.2?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.4.6-99.el7_9.2.noarch", "product": { "name": "httpd-manual-0:2.4.6-99.el7_9.2.noarch", "product_id": "httpd-manual-0:2.4.6-99.el7_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-99.el7_9.2?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.src as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.src", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-99.el7_9.2.noarch as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch" }, "product_reference": "httpd-manual-0:2.4.6-99.el7_9.2.noarch", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.src", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-99.el7_9.2.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch" }, "product_reference": "httpd-manual-0:2.4.6-99.el7_9.2.noarch", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-31T14:59:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4943" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-31T14:59:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4943" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-31T14:59:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4943" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
rhsa-2024_4862
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4862", "url": "https://access.redhat.com/errata/RHSA-2024:4862" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4862.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2024-12-17T09:16:17+00:00", "generator": { "date": "2024-12-17T09:16:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:4862", "initial_release_date": "2024-07-25T08:41:39+00:00", "revision_history": [ { "date": "2024-07-25T08:41:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-25T08:41:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T09:16:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.53-11.el9_2.8.src", "product": { "name": "httpd-0:2.4.53-11.el9_2.8.src", "product_id": "httpd-0:2.4.53-11.el9_2.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.53-11.el9_2.8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-core-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-core-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_lua-0:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_lua-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.53-11.el9_2.8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_session-0:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_session-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-11.el9_2.8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-11.el9_2.8?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.53-11.el9_2.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_session-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_session-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-core-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-core-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_lua-0:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_lua-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.53-11.el9_2.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_session-0:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_session-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-11.el9_2.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-11.el9_2.8?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-core-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-core-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-devel-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-tools-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.s390x", "product_id": "mod_ldap-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_lua-0:2.4.53-11.el9_2.8.s390x", "product_id": "mod_lua-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "product_id": "mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.53-11.el9_2.8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_session-0:2.4.53-11.el9_2.8.s390x", "product_id": "mod_session-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.s390x", "product_id": "mod_ssl-1:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_id": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-11.el9_2.8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_id": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-11.el9_2.8?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "product": { "name": "httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "product_id": "httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.8?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.53-11.el9_2.8.noarch", "product": { "name": "httpd-manual-0:2.4.53-11.el9_2.8.noarch", "product_id": "httpd-manual-0:2.4.53-11.el9_2.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.53-11.el9_2.8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.53-11.el9_2.8.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src" }, "product_reference": "httpd-0:2.4.53-11.el9_2.8.src", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-core-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-core-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-core-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-devel-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.53-11.el9_2.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch" }, "product_reference": "httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.53-11.el9_2.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch" }, "product_reference": "httpd-manual-0:2.4.53-11.el9_2.8.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-tools-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_ldap-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_lua-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_lua-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_lua-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_session-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_session-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_session-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_session-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_ssl-1:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-25T08:41:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4862" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-25T08:41:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4862" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-25T08:41:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4862" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
RHSA-2024:4827
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4827", "url": "https://access.redhat.com/errata/RHSA-2024:4827" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4827.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2025-01-09T06:22:21+00:00", "generator": { "date": "2025-01-09T06:22:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2024:4827", "initial_release_date": "2024-07-24T13:18:31+00:00", "revision_history": [ { "date": "2024-07-24T13:18:31+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-24T13:18:31+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-09T06:22:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.6::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.6::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.6::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8060020240719220036:ad008a3a", "product": { "name": "httpd:2.4:8060020240719220036:ad008a3a", "product_id": "httpd:2.4:8060020240719220036:ad008a3a", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8060020240719220036:ad008a3a" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "product_id": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "product": { "name": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "product_id": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "product": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "product_id": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "product": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "product_id": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=src" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product_id": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product_id": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product_id": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product_id": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product_id": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product_id": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product_id": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product_id": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product_id": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product_id": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product_id": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product_id": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, "product_reference": "httpd:2.4:8060020240719220036:ad008a3a", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch" }, "product_reference": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, "product_reference": "httpd:2.4:8060020240719220036:ad008a3a", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch" }, "product_reference": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x" }, "product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, "product_reference": "httpd:2.4:8060020240719220036:ad008a3a", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch" }, "product_reference": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T13:18:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4827" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T13:18:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4827" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T13:18:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4827" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
RHSA-2024:4943
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4943", "url": "https://access.redhat.com/errata/RHSA-2024:4943" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4943.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2025-01-09T06:23:25+00:00", "generator": { "date": "2025-01-09T06:23:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2024:4943", "initial_release_date": "2024-07-31T14:59:20+00:00", "revision_history": [ { "date": "2024-07-31T14:59:20+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-31T14:59:20+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-09T06:23:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7 ELS)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-99.el7_9.2.src", "product": { "name": "httpd-0:2.4.6-99.el7_9.2.src", "product_id": "httpd-0:2.4.6-99.el7_9.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-99.el7_9.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-99.el7_9.2.x86_64", "product": { "name": "httpd-0:2.4.6-99.el7_9.2.x86_64", "product_id": "httpd-0:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-99.el7_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "product": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "product_id": "httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-99.el7_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "product": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "product_id": "httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-99.el7_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-99.el7_9.2.x86_64", "product": { "name": "mod_session-0:2.4.6-99.el7_9.2.x86_64", "product_id": "mod_session-0:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-99.el7_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "product": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "product_id": "mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-99.el7_9.2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "product_id": "httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-99.el7_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "product": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "product_id": "mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-99.el7_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "product": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "product_id": "mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-99.el7_9.2?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "httpd-0:2.4.6-99.el7_9.2.ppc64le", "product_id": "httpd-0:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-99.el7_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "product_id": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-99.el7_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "product_id": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-99.el7_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64le", "product_id": "mod_session-0:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-99.el7_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "product_id": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-99.el7_9.2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "product_id": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-99.el7_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "product_id": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-99.el7_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "product_id": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-99.el7_9.2?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-99.el7_9.2.ppc64", "product": { "name": "httpd-0:2.4.6-99.el7_9.2.ppc64", "product_id": "httpd-0:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-99.el7_9.2?arch=ppc64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "product": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "product_id": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-99.el7_9.2?arch=ppc64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "product": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "product_id": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-99.el7_9.2?arch=ppc64" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64", "product": { "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64", "product_id": "mod_session-0:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-99.el7_9.2?arch=ppc64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "product": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "product_id": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-99.el7_9.2?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "product": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "product_id": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-99.el7_9.2?arch=ppc64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "product": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "product_id": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-99.el7_9.2?arch=ppc64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "product": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "product_id": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-99.el7_9.2?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-99.el7_9.2.s390x", "product": { "name": "httpd-0:2.4.6-99.el7_9.2.s390x", "product_id": "httpd-0:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-99.el7_9.2?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-99.el7_9.2.s390x", "product": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.s390x", "product_id": "httpd-devel-0:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-99.el7_9.2?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-99.el7_9.2.s390x", "product": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.s390x", "product_id": "httpd-tools-0:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-99.el7_9.2?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-99.el7_9.2.s390x", "product": { "name": "mod_session-0:2.4.6-99.el7_9.2.s390x", "product_id": "mod_session-0:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-99.el7_9.2?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-99.el7_9.2.s390x", "product": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.s390x", "product_id": "mod_ssl-1:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-99.el7_9.2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "product": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "product_id": "httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-99.el7_9.2?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-99.el7_9.2.s390x", "product": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.s390x", "product_id": "mod_ldap-0:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-99.el7_9.2?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "product": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "product_id": "mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-99.el7_9.2?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.4.6-99.el7_9.2.noarch", "product": { "name": "httpd-manual-0:2.4.6-99.el7_9.2.noarch", "product_id": "httpd-manual-0:2.4.6-99.el7_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-99.el7_9.2?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.src as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.src", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-99.el7_9.2.noarch as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch" }, "product_reference": "httpd-manual-0:2.4.6-99.el7_9.2.noarch", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.src", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-99.el7_9.2.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch" }, "product_reference": "httpd-manual-0:2.4.6-99.el7_9.2.noarch", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-31T14:59:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4943" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-31T14:59:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4943" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-31T14:59:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4943" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
rhsa-2024_5240
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 5 is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products and packaged under Red Hat JBoss Core Services, to allow for faster distribution of updates and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 5 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 4, and includes bug fixes and enhancements, which are documented in the Release Notes linked to in the References section.\n\nSecurity Fix(es):\n\n* jbcs-httpd24-httpd: Potential SSRF in mod_rewrite (CVE-2024-39573)\n* jbcs-httpd24-httpd: null pointer dereference in mod_proxy (CVE-2024-38477)\n* jbcs-httpd24-httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n* jbcs-httpd24-httpd: Encoding problem in mod_proxy (CVE-2024-38473)\n* jbcs-httpd24-httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n* jbcs-httpd24-httpd: Security issues via backend applications whose response headers are malicious or exploitable (CVE-2024-38476)\n\nA Red Hat Security Bulletin which addresses further details about this flaw is available in the References section.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:5240", "url": "https://access.redhat.com/errata/RHSA-2024:5240" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_core_services/2.4.57/html/red_hat_jboss_core_services_apache_http_server_2.4.57_service_pack_5_release_notes/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_core_services/2.4.57/html/red_hat_jboss_core_services_apache_http_server_2.4.57_service_pack_5_release_notes/index" }, { "category": "external", "summary": "2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295015" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5240.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP5 security update", "tracking": { "current_release_date": "2024-12-17T09:15:32+00:00", "generator": { "date": "2024-12-17T09:15:32+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:5240", "initial_release_date": "2024-08-13T13:06:23+00:00", "revision_history": [ { "date": "2024-08-13T13:06:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-08-13T13:06:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T09:15:32+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services 1", "product": { "name": "Red Hat JBoss Core Services 1", "product_id": "Red Hat JBoss Core Services 1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38473", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:36+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295012" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. Due to an encoding problem, specially crafted request URLs with incorrect encoding can be sent to backend services, potentially bypassing authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Encoding problem in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations where mechanisms other than ProxyPass/ProxyPassMatch or RewriteRule with the \u0027P\u0027 flag are used to configure a request to be proxied, such as SetHandler or inadvertent proxying via CVE-2024-39573. Note that these alternate mechanisms may be used within .htaccess files.\n\nFor more information about CVE-2024-39573, see https://access.redhat.com/security/cve/CVE-2024-39573.\n\nAdditionally, this flaw requires mod_proxy to be loaded and being used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38473" }, { "category": "external", "summary": "RHBZ#2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38473", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:06:23+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5240" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Encoding problem in mod_proxy" }, { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:06:23+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5240" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:06:23+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5240" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38476", "cwe": { "id": "CWE-829", "name": "Inclusion of Functionality from Untrusted Control Sphere" }, "discovery_date": "2024-07-01T19:22:16+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295015" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. Backend applications whose response headers are malicious or exploitable may allow information disclosure, server-side request forgery (SSRF) or local script execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Security issues via\u00a0backend applications whose response headers are malicious or exploitable", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw can only be exploited by backend applications via malicious or exploitable response headers. For this reason, this flaw was rated with an important and not critical severity.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38476" }, { "category": "external", "summary": "RHBZ#2295015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295015" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38476", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38476" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38476", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38476" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:06:23+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5240" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Security issues via\u00a0backend applications whose response headers are malicious or exploitable" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:06:23+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5240" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" }, { "cve": "CVE-2024-39573", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295022" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. A potential SSRF allows an attacker to cause unsafe rules used in the RewriteRule directive to unexpectedly set up URLs to be handled by the mod_proxy module.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Potential SSRF in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive.\n\nAdditionally, this flaw requires mod_rewrite and mod_proxy to be loaded and being used. These modules can be disabled via the configuration file if their functionality are not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-39573" }, { "category": "external", "summary": "RHBZ#2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-39573", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:06:23+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5240" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Potential SSRF in mod_rewrite" } ] }
RHSA-2024:4820
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4820", "url": "https://access.redhat.com/errata/RHSA-2024:4820" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4820.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2025-01-09T06:22:44+00:00", "generator": { "date": "2025-01-09T06:22:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2024:4820", "initial_release_date": "2024-07-24T12:40:36+00:00", "revision_history": [ { "date": "2024-07-24T12:40:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-24T12:40:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-09T06:22:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8020020240720043142:4cda2c84", "product": { "name": "httpd:2.4:8020020240720043142:4cda2c84", "product_id": "httpd:2.4:8020020240720043142:4cda2c84", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8020020240720043142:4cda2c84" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "product_id": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "product": { "name": "httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "product_id": "httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "product": { "name": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "product_id": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "product_id": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B22123%2Bcf5a147c.4?arch=src" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "product": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "product_id": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product_id": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B22123%2Bcf5a147c.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.2.0%2B22123%2Bcf5a147c.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.2.0%2B22123%2Bcf5a147c.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_id": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_id": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_id": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, "product_reference": "httpd:2.4:8020020240720043142:4cda2c84", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src" }, "product_reference": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch" }, "product_reference": "httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src" }, "product_reference": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64" }, "product_reference": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T12:40:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4820" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T12:40:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4820" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T12:40:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4820" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
rhsa-2024_4827
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4827", "url": "https://access.redhat.com/errata/RHSA-2024:4827" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4827.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2024-12-17T09:15:43+00:00", "generator": { "date": "2024-12-17T09:15:43+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:4827", "initial_release_date": "2024-07-24T13:18:31+00:00", "revision_history": [ { "date": "2024-07-24T13:18:31+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-24T13:18:31+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T09:15:43+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.6::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.6::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.6::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8060020240719220036:ad008a3a", "product": { "name": "httpd:2.4:8060020240719220036:ad008a3a", "product_id": "httpd:2.4:8060020240719220036:ad008a3a", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8060020240719220036:ad008a3a" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "product_id": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "product": { "name": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "product_id": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "product": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "product_id": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "product": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "product_id": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=src" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product_id": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product_id": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product_id": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product_id": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product_id": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product_id": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product_id": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product_id": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product_id": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product_id": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product_id": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product_id": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, "product_reference": "httpd:2.4:8060020240719220036:ad008a3a", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch" }, "product_reference": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, "product_reference": "httpd:2.4:8060020240719220036:ad008a3a", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch" }, "product_reference": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x" }, "product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, "product_reference": "httpd:2.4:8060020240719220036:ad008a3a", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch" }, "product_reference": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T13:18:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4827" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T13:18:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4827" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T13:18:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4827" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
rhsa-2024:4720
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Encoding problem in mod_proxy (CVE-2024-38473)\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\n* httpd: Potential SSRF in mod_rewrite (CVE-2024-39573)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4720", "url": "https://access.redhat.com/errata/RHSA-2024:4720" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4720.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2025-01-09T06:23:04+00:00", "generator": { "date": "2025-01-09T06:23:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2024:4720", "initial_release_date": "2024-07-23T08:57:47+00:00", "revision_history": [ { "date": "2024-07-23T08:57:47+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-23T08:57:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-09T06:23:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8100020240712114234:489197e6", "product": { "name": "httpd:2.4:8100020240712114234:489197e6", "product_id": "httpd:2.4:8100020240712114234:489197e6", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8100020240712114234:489197e6" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "product_id": "httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "product": { "name": "httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "product_id": "httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "product": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "product_id": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "product": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "product_id": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=src" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "product": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "product_id": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product_id": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product_id": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product_id": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product_id": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product_id": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product_id": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product_id": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product_id": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product_id": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product_id": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product_id": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product_id": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product_id": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product_id": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product_id": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product_id": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, "product_reference": "httpd:2.4:8100020240712114234:489197e6", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src" }, "product_reference": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch" }, "product_reference": "httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64" }, "product_reference": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le" }, "product_reference": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x" }, "product_reference": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src" }, "product_reference": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64" }, "product_reference": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x" }, "product_reference": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38473", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:36+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295012" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. Due to an encoding problem, specially crafted request URLs with incorrect encoding can be sent to backend services, potentially bypassing authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Encoding problem in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations where mechanisms other than ProxyPass/ProxyPassMatch or RewriteRule with the \u0027P\u0027 flag are used to configure a request to be proxied, such as SetHandler or inadvertent proxying via CVE-2024-39573. Note that these alternate mechanisms may be used within .htaccess files.\n\nFor more information about CVE-2024-39573, see https://access.redhat.com/security/cve/CVE-2024-39573.\n\nAdditionally, this flaw requires mod_proxy to be loaded and being used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38473" }, { "category": "external", "summary": "RHBZ#2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38473", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:57:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4720" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Encoding problem in mod_proxy" }, { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:57:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4720" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:57:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4720" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:57:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4720" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" }, { "cve": "CVE-2024-39573", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295022" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. A potential SSRF allows an attacker to cause unsafe rules used in the RewriteRule directive to unexpectedly set up URLs to be handled by the mod_proxy module.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Potential SSRF in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive.\n\nAdditionally, this flaw requires mod_rewrite and mod_proxy to be loaded and being used. These modules can be disabled via the configuration file if their functionality are not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-39573" }, { "category": "external", "summary": "RHBZ#2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-39573", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:57:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4720" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Potential SSRF in mod_rewrite" } ] }
rhsa-2024:4862
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4862", "url": "https://access.redhat.com/errata/RHSA-2024:4862" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4862.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2025-01-09T06:22:55+00:00", "generator": { "date": "2025-01-09T06:22:55+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2024:4862", "initial_release_date": "2024-07-25T08:41:39+00:00", "revision_history": [ { "date": "2024-07-25T08:41:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-25T08:41:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-09T06:22:55+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.53-11.el9_2.8.src", "product": { "name": "httpd-0:2.4.53-11.el9_2.8.src", "product_id": "httpd-0:2.4.53-11.el9_2.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.53-11.el9_2.8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-core-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-core-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_lua-0:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_lua-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.53-11.el9_2.8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_session-0:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_session-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-11.el9_2.8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-11.el9_2.8?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.53-11.el9_2.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_session-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_session-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-core-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-core-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_lua-0:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_lua-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.53-11.el9_2.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_session-0:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_session-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-11.el9_2.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-11.el9_2.8?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-core-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-core-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-devel-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-tools-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.s390x", "product_id": "mod_ldap-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_lua-0:2.4.53-11.el9_2.8.s390x", "product_id": "mod_lua-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "product_id": "mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.53-11.el9_2.8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_session-0:2.4.53-11.el9_2.8.s390x", "product_id": "mod_session-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.s390x", "product_id": "mod_ssl-1:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_id": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-11.el9_2.8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_id": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-11.el9_2.8?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "product": { "name": "httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "product_id": "httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.8?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.53-11.el9_2.8.noarch", "product": { "name": "httpd-manual-0:2.4.53-11.el9_2.8.noarch", "product_id": "httpd-manual-0:2.4.53-11.el9_2.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.53-11.el9_2.8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.53-11.el9_2.8.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src" }, "product_reference": "httpd-0:2.4.53-11.el9_2.8.src", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-core-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-core-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-core-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-devel-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.53-11.el9_2.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch" }, "product_reference": "httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.53-11.el9_2.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch" }, "product_reference": "httpd-manual-0:2.4.53-11.el9_2.8.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-tools-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_ldap-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_lua-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_lua-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_lua-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_session-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_session-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_session-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_session-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_ssl-1:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-25T08:41:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4862" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-25T08:41:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4862" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-25T08:41:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4862" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
rhsa-2024:5240
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 5 is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products and packaged under Red Hat JBoss Core Services, to allow for faster distribution of updates and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 5 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 4, and includes bug fixes and enhancements, which are documented in the Release Notes linked to in the References section.\n\nSecurity Fix(es):\n\n* jbcs-httpd24-httpd: Potential SSRF in mod_rewrite (CVE-2024-39573)\n* jbcs-httpd24-httpd: null pointer dereference in mod_proxy (CVE-2024-38477)\n* jbcs-httpd24-httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n* jbcs-httpd24-httpd: Encoding problem in mod_proxy (CVE-2024-38473)\n* jbcs-httpd24-httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n* jbcs-httpd24-httpd: Security issues via backend applications whose response headers are malicious or exploitable (CVE-2024-38476)\n\nA Red Hat Security Bulletin which addresses further details about this flaw is available in the References section.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:5240", "url": "https://access.redhat.com/errata/RHSA-2024:5240" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_core_services/2.4.57/html/red_hat_jboss_core_services_apache_http_server_2.4.57_service_pack_5_release_notes/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_core_services/2.4.57/html/red_hat_jboss_core_services_apache_http_server_2.4.57_service_pack_5_release_notes/index" }, { "category": "external", "summary": "2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295015" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5240.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP5 security update", "tracking": { "current_release_date": "2025-01-09T06:23:19+00:00", "generator": { "date": "2025-01-09T06:23:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2024:5240", "initial_release_date": "2024-08-13T13:06:23+00:00", "revision_history": [ { "date": "2024-08-13T13:06:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-08-13T13:06:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-09T06:23:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Text-Only JBCS", "product": { "name": "Text-Only JBCS", "product_id": "Text-Only JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38473", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:36+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295012" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. Due to an encoding problem, specially crafted request URLs with incorrect encoding can be sent to backend services, potentially bypassing authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Encoding problem in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations where mechanisms other than ProxyPass/ProxyPassMatch or RewriteRule with the \u0027P\u0027 flag are used to configure a request to be proxied, such as SetHandler or inadvertent proxying via CVE-2024-39573. Note that these alternate mechanisms may be used within .htaccess files.\n\nFor more information about CVE-2024-39573, see https://access.redhat.com/security/cve/CVE-2024-39573.\n\nAdditionally, this flaw requires mod_proxy to be loaded and being used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38473" }, { "category": "external", "summary": "RHBZ#2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38473", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:06:23+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5240" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Text-Only JBCS" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Encoding problem in mod_proxy" }, { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:06:23+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5240" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "Text-Only JBCS" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:06:23+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5240" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "Text-Only JBCS" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38476", "cwe": { "id": "CWE-829", "name": "Inclusion of Functionality from Untrusted Control Sphere" }, "discovery_date": "2024-07-01T19:22:16+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295015" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. Backend applications whose response headers are malicious or exploitable may allow information disclosure, server-side request forgery (SSRF) or local script execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Security issues via\u00a0backend applications whose response headers are malicious or exploitable", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw can only be exploited by backend applications via malicious or exploitable response headers. For this reason, this flaw was rated with an important and not critical severity.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38476" }, { "category": "external", "summary": "RHBZ#2295015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295015" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38476", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38476" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38476", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38476" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:06:23+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5240" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "Text-Only JBCS" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Security issues via\u00a0backend applications whose response headers are malicious or exploitable" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:06:23+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5240" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "Text-Only JBCS" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" }, { "cve": "CVE-2024-39573", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295022" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. A potential SSRF allows an attacker to cause unsafe rules used in the RewriteRule directive to unexpectedly set up URLs to be handled by the mod_proxy module.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Potential SSRF in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive.\n\nAdditionally, this flaw requires mod_rewrite and mod_proxy to be loaded and being used. These modules can be disabled via the configuration file if their functionality are not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-39573" }, { "category": "external", "summary": "RHBZ#2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-39573", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:06:23+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5240" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Text-Only JBCS" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Potential SSRF in mod_rewrite" } ] }
rhsa-2024:4830
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4830", "url": "https://access.redhat.com/errata/RHSA-2024:4830" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4830.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2025-01-09T06:22:34+00:00", "generator": { "date": "2025-01-09T06:22:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2024:4830", "initial_release_date": "2024-07-24T14:05:13+00:00", "revision_history": [ { "date": "2024-07-24T14:05:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-24T14:05:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-09T06:22:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.4::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.4::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8040020240720035525:522a0ee4", "product": { "name": "httpd:2.4:8040020240720035525:522a0ee4", "product_id": "httpd:2.4:8040020240720035525:522a0ee4", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8040020240720035525:522a0ee4" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "product_id": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "product": { "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "product_id": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "product": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "product_id": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B21747%2B916a74df.3?arch=src" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B21747%2B916a74df.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B21747%2B916a74df.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B21747%2B916a74df.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B21747%2B916a74df.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B21747%2B916a74df.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B21747%2B916a74df.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, "product_reference": "httpd:2.4:8040020240720035525:522a0ee4", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch" }, "product_reference": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, "product_reference": "httpd:2.4:8040020240720035525:522a0ee4", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch" }, "product_reference": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, "product_reference": "httpd:2.4:8040020240720035525:522a0ee4", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch" }, "product_reference": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T14:05:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4830" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T14:05:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4830" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T14:05:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4830" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
RHSA-2024:4720
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Encoding problem in mod_proxy (CVE-2024-38473)\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\n* httpd: Potential SSRF in mod_rewrite (CVE-2024-39573)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4720", "url": "https://access.redhat.com/errata/RHSA-2024:4720" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4720.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2025-01-09T06:23:04+00:00", "generator": { "date": "2025-01-09T06:23:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2024:4720", "initial_release_date": "2024-07-23T08:57:47+00:00", "revision_history": [ { "date": "2024-07-23T08:57:47+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-23T08:57:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-09T06:23:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8100020240712114234:489197e6", "product": { "name": "httpd:2.4:8100020240712114234:489197e6", "product_id": "httpd:2.4:8100020240712114234:489197e6", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8100020240712114234:489197e6" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "product_id": "httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "product": { "name": "httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "product_id": "httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "product": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "product_id": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "product": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "product_id": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=src" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "product": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "product_id": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product_id": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product_id": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product_id": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product_id": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product_id": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product_id": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product_id": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product_id": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product_id": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product_id": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product_id": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product_id": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product_id": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product_id": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product_id": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product_id": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, "product_reference": "httpd:2.4:8100020240712114234:489197e6", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src" }, "product_reference": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch" }, "product_reference": "httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64" }, "product_reference": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le" }, "product_reference": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x" }, "product_reference": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src" }, "product_reference": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64" }, "product_reference": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x" }, "product_reference": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38473", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:36+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295012" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. Due to an encoding problem, specially crafted request URLs with incorrect encoding can be sent to backend services, potentially bypassing authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Encoding problem in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations where mechanisms other than ProxyPass/ProxyPassMatch or RewriteRule with the \u0027P\u0027 flag are used to configure a request to be proxied, such as SetHandler or inadvertent proxying via CVE-2024-39573. Note that these alternate mechanisms may be used within .htaccess files.\n\nFor more information about CVE-2024-39573, see https://access.redhat.com/security/cve/CVE-2024-39573.\n\nAdditionally, this flaw requires mod_proxy to be loaded and being used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38473" }, { "category": "external", "summary": "RHBZ#2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38473", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:57:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4720" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Encoding problem in mod_proxy" }, { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:57:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4720" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:57:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4720" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:57:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4720" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" }, { "cve": "CVE-2024-39573", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295022" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. A potential SSRF allows an attacker to cause unsafe rules used in the RewriteRule directive to unexpectedly set up URLs to be handled by the mod_proxy module.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Potential SSRF in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive.\n\nAdditionally, this flaw requires mod_rewrite and mod_proxy to be loaded and being used. These modules can be disabled via the configuration file if their functionality are not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-39573" }, { "category": "external", "summary": "RHBZ#2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-39573", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:57:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4720" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Potential SSRF in mod_rewrite" } ] }
fkie_cve-2024-38475
Vulnerability from fkie_nvd
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are\u00a0permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. \n\nSubstitutions in\u00a0server context that use a backreferences or variables as the first segment of the substitution are affected.\u00a0 Some unsafe RewiteRules will be broken by this change and the rewrite flag \"UnsafePrefixStat\" can be used to opt back in once ensuring the substitution is appropriately constrained." }, { "lang": "es", "value": "El escape inadecuado de la salida en mod_rewrite en Apache HTTP Server 2.4.59 y versiones anteriores permite a un atacante asignar URL a ubicaciones del sistema de archivos que el servidor permite servir, pero a las que no se puede acceder intencional o directamente mediante ninguna URL, dando como resultado la ejecuci\u00f3n del c\u00f3digo o la divulgaci\u00f3n del c\u00f3digo fuente. Las sustituciones en el contexto del servidor que utilizan referencias inversas o variables como primer segmento de la sustituci\u00f3n se ven afectadas. Este cambio romper\u00e1 algunas RewiteRules inseguras y el indicador de reescritura \"UnsafePrefixStat\" se puede usar para volver a participar una vez que se garantice que la sustituci\u00f3n est\u00e9 restringida adecuadamente." } ], "id": "CVE-2024-38475", "lastModified": "2024-11-21T09:26:03.180", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-07-01T19:15:04.883", "references": [ { "source": "security@apache.org", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" }, { "source": "security@apache.org", "url": "https://security.netapp.com/advisory/ntap-20240712-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2024/07/01/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/apache/httpd/commit/9a6157d1e2f7ab15963020381054b48782bc18cf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20240712-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.blackhat.com/us-24/briefings/schedule/index.html#confusion-attacks-exploiting-hidden-semantic-ambiguity-in-apache-http-server-pre-recorded-40227" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-116" } ], "source": "security@apache.org", "type": "Secondary" } ] }
wid-sec-w-2024-1504
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Apache ist ein Webserver f\u00fcr verschiedene Plattformen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apache HTTP Server ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder vertrauliche Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1504 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1504.json" }, { "category": "self", "summary": "WID-SEC-2024-1504 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1504" }, { "category": "external", "summary": "Apache Advisory vom 2024-07-01", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" }, { "category": "external", "summary": "Red Hat Bugzilla vom 2024-07-01", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295006" }, { "category": "external", "summary": "Red Hat Bugzilla vom 2024-07-01", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "Red Hat Bugzilla vom 2024-07-01", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "Red Hat Bugzilla vom 2024-07-01", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "Red Hat Bugzilla vom 2024-07-01", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "Red Hat Bugzilla vom 2024-07-01", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295018" }, { "category": "external", "summary": "Red Hat Bugzilla vom 2024-07-01", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "external", "summary": "Apache HTTP Server", "url": "https://seclists.org/oss-sec/2024/q3/8" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:4197 vom 2024-07-02", "url": "https://errata.build.resf.org/RLSA-2024:4197" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-39F1A828ED vom 2024-07-03", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-39f1a828ed" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-E7E73BEFAD vom 2024-07-03", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-e7e73befad" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6885-1 vom 2024-07-08", "url": "https://ubuntu.com/security/notices/USN-6885-1" }, { "category": "external", "summary": "IBM Security Bulletin 7159849 vom 2024-07-09", "url": "https://www.ibm.com/support/pages/node/7159849" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-661BB6322D vom 2024-07-11", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-661bb6322d" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-CB8ACBF644 vom 2024-07-11", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-cb8acbf644" }, { "category": "external", "summary": "IBM Security Bulletin 7160019 vom 2024-07-11", "url": "https://www.ibm.com/support/pages/node/7160019" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2405-1 vom 2024-07-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018934.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5729 vom 2024-07-12", "url": "https://lists.debian.org/debian-security-announce/2024/msg00140.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6885-2 vom 2024-07-11", "url": "https://ubuntu.com/security/notices/USN-6885-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2560-1 vom 2024-07-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/019002.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2594 vom 2024-07-23", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2594.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2591-1 vom 2024-07-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/019006.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2597-1 vom 2024-07-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/019023.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-4726 vom 2024-07-24", "url": "https://linux.oracle.com/errata/ELSA-2024-4726.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4719 vom 2024-07-23", "url": "https://access.redhat.com/errata/RHSA-2024:4719" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4720 vom 2024-07-23", "url": "https://access.redhat.com/errata/RHSA-2024:4720" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4726 vom 2024-07-23", "url": "https://access.redhat.com/errata/RHSA-2024:4726" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-4720 vom 2024-07-24", "url": "https://linux.oracle.com/errata/ELSA-2024-4720.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-1944 vom 2024-07-24", "url": "https://alas.aws.amazon.com/ALAS-2024-1944.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4827 vom 2024-07-24", "url": "https://access.redhat.com/errata/RHSA-2024:4827" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4830 vom 2024-07-24", "url": "https://access.redhat.com/errata/RHSA-2024:4830" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4820 vom 2024-07-24", "url": "https://access.redhat.com/errata/RHSA-2024:4820" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4862 vom 2024-07-25", "url": "https://access.redhat.com/errata/RHSA-2024:4862" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4863 vom 2024-07-25", "url": "https://access.redhat.com/errata/RHSA-2024:4863" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:4726 vom 2024-07-26", "url": "https://errata.build.resf.org/RLSA-2024:4726" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2624-1 vom 2024-07-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/019050.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4938 vom 2024-07-31", "url": "https://access.redhat.com/errata/RHSA-2024:4938" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4943 vom 2024-07-31", "url": "https://access.redhat.com/errata/RHSA-2024:4943" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-E83AF0855E vom 2024-08-01", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-e83af0855e" }, { "category": "external", "summary": "F5 Security Advisory K000140505 vom 2024-08-03", "url": "https://my.f5.com/manage/s/article/K000140505" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5001 vom 2024-08-05", "url": "https://access.redhat.com/errata/RHSA-2024:5001" }, { "category": "external", "summary": "F5 Security Advisory K000140620 vom 2024-08-08", "url": "https://my.f5.com/manage/s/article/K000140620" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5138 vom 2024-08-08", "url": "https://access.redhat.com/errata/RHSA-2024:5138" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-5138 vom 2024-08-09", "url": "https://linux.oracle.com/errata/ELSA-2024-5138.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5193 vom 2024-08-12", "url": "https://access.redhat.com/errata/RHSA-2024:5193" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5239 vom 2024-08-13", "url": "https://access.redhat.com/errata/RHSA-2024:5239" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5240 vom 2024-08-13", "url": "https://access.redhat.com/errata/RHSA-2024:5240" }, { "category": "external", "summary": "F5 Security Advisory K000140693 vom 2024-08-13", "url": "https://my.f5.com/manage/s/article/K000140693" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-5193 vom 2024-08-14", "url": "https://linux.oracle.com/errata/ELSA-2024-5193.html" }, { "category": "external", "summary": "IBM Security Bulletin 7165827 vom 2024-08-19", "url": "https://www.ibm.com/support/pages/node/7165827" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2436-1 vom 2024-08-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019226.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2997-1 vom 2024-08-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019299.html" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:5138 vom 2024-08-21", "url": "https://errata.build.resf.org/RLSA-2024:5138" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:5193 vom 2024-08-21", "url": "https://errata.build.resf.org/RLSA-2024:5193" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2999-1 vom 2024-08-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019301.html" }, { "category": "external", "summary": "F5 Security Advisory K000140784 vom 2024-08-23", "url": "https://my.f5.com/manage/s/article/K000140784" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5812 vom 2024-08-26", "url": "https://access.redhat.com/errata/RHSA-2024:5812" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5832 vom 2024-08-26", "url": "https://access.redhat.com/errata/RHSA-2024:5832" }, { "category": "external", "summary": "DELL Security Update for Dell PowerScale OneFS", "url": "https://www.dell.com/support/kbdoc/en-us/000228207/dsa-2024-346-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6136 vom 2024-09-03", "url": "https://access.redhat.com/errata/RHSA-2024:6136" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6004 vom 2024-09-04", "url": "https://access.redhat.com/errata/RHSA-2024:6004" }, { "category": "external", "summary": "IBM Security Bulletin 7166853 vom 2024-09-05", "url": "https://www.ibm.com/support/pages/node/7166853" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6013 vom 2024-09-05", "url": "https://access.redhat.com/errata/RHSA-2024:6013" }, { "category": "external", "summary": "IBM Security Bulletin 7167662 vom 2024-09-05", "url": "https://www.ibm.com/support/pages/node/7167662" }, { "category": "external", "summary": "XEROX Security Advisory XRX24-013 vom 2024-09-05", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2024/09/Xerox-Security-Bulletin-XRX24-013-for-Xerox-FreeFlow-Print-Server-v2-_Windows10.pdf" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6468 vom 2024-09-09", "url": "https://access.redhat.com/errata/RHSA-2024:6468" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6467 vom 2024-09-09", "url": "https://access.redhat.com/errata/RHSA-2024:6467" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3173-1 vom 2024-09-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019389.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3172-1 vom 2024-09-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019390.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6584 vom 2024-09-11", "url": "https://access.redhat.com/errata/RHSA-2024:6584" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6583 vom 2024-09-11", "url": "https://access.redhat.com/errata/RHSA-2024:6583" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-4943 vom 2024-09-14", "url": "https://linux.oracle.com/errata/ELSA-2024-4943.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6885-3 vom 2024-09-18", "url": "https://ubuntu.com/security/notices/USN-6885-3" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6928 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:6928" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6927 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:6927" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7101 vom 2024-09-25", "url": "https://access.redhat.com/errata/RHSA-2024:7101" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202409-31 vom 2024-09-28", "url": "https://security.gentoo.org/glsa/202409-31" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-423 vom 2024-10-11", "url": "https://www.dell.com/support/kbdoc/de-de/000235068/dsa-2024-423-security-update-for-dell-networker-and-networker-management-console-nmc-multiple-component-vulnerabilities" }, { "category": "external", "summary": "IBM Security Bulletin 7173018 vom 2024-10-14", "url": "https://www.ibm.com/support/pages/node/7173018" }, { "category": "external", "summary": "Debian Security Advisory DLA-3921 vom 2024-10-17", "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00013.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-7101 vom 2024-10-17", "url": "https://linux.oracle.com/errata/ELSA-2024-7101.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8680 vom 2024-10-31", "url": "https://access.redhat.com/errata/RHSA-2024:8680" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-8680 vom 2024-10-31", "url": "http://linux.oracle.com/errata/ELSA-2024-8680.html" }, { "category": "external", "summary": "HCL Security Advisory", "url": "https://support.hcl-software.com/csm?id=kb_article\u0026sysparm_article=KB0115052" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:8680 vom 2024-11-08", "url": "https://errata.build.resf.org/RLSA-2024:8680" }, { "category": "external", "summary": "XEROX Security Advisory XRX24-016 vom 2024-11-18", "url": "https://security.business.xerox.com/wp-content/uploads/2024/11/Xerox%C2%AE-Security-Bulletin-XRX24-016-for-Xerox%C2%AEFreeFlow%C2%AE-Print-Server-v9.pdf" }, { "category": "external", "summary": "XEROX Security Advisory XRX24-017 vom 2024-11-21", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2024/11/Xerox-Security-Bulletin-XRX24-017-for-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-453 vom 2024-12-05", "url": "https://www.dell.com/support/kbdoc/de-de/000256645/dsa-2024-453-security-update-for-dell-powerscale-onefs-multiple-security-vulnerabilities" }, { "category": "external", "summary": "SonicWall Security Advisory SNWLID-2024-0018 vom 2024-12-06", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0018" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-483 vom 2024-12-18", "url": "https://www.dell.com/support/kbdoc/de-de/000256642/dsa-2024-483-security-update-for-dell-ecs-multiple-vulnerabilities" }, { "category": "external", "summary": "XEROX Security Advisory XRX24-019 vom 2024-12-17", "url": "https://security.business.xerox.com/wp-content/uploads/2024/12/Xerox-Security-Bulletin-XRX24-019-for-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf" }, { "category": "external", "summary": "XEROX Security Advisory XRX25-001 vom 2025-01-13", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/01/Xerox-Security-Bulletin-XRX25-001-for-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf" }, { "category": "external", "summary": "HPE Security Bulletin vom 2025-01-17", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbux04773en_us\u0026docLocale=en_US" } ], "source_lang": "en-US", "title": "Apache HTTP Server: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-01-19T23:00:00.000+00:00", "generator": { "date": "2025-01-20T09:21:02.020+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2024-1504", "initial_release_date": "2024-07-01T22:00:00.000+00:00", "revision_history": [ { "date": "2024-07-01T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-07-02T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-07-03T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2024-07-08T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-07-09T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von IBM und IBM-APAR aufgenommen" }, { "date": "2024-07-11T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Fedora, IBM, SUSE, Debian und Ubuntu aufgenommen" }, { "date": "2024-07-18T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-07-22T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Amazon und SUSE aufgenommen" }, { "date": "2024-07-23T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2024-07-24T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Amazon und Red Hat aufgenommen" }, { "date": "2024-07-25T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-07-28T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-07-29T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-07-31T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-08-01T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2024-08-04T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von F5 aufgenommen" }, { "date": "2024-08-07T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von F5 aufgenommen" }, { "date": "2024-08-08T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-08-11T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2024-08-13T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat und F5 aufgenommen" }, { "date": "2024-08-14T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-08-18T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-08-19T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-08-21T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von SUSE und Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-08-22T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-08-25T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von F5 aufgenommen" }, { "date": "2024-09-01T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-09-02T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-03T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-05T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von IBM, Red Hat und XEROX aufgenommen" }, { "date": "2024-09-08T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-09T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-09-11T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-15T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-09-18T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-09-24T22:00:00.000+00:00", "number": "36", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-25T22:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-29T22:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2024-10-10T22:00:00.000+00:00", "number": "39", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-10-13T22:00:00.000+00:00", "number": "40", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-10-17T22:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Debian und Oracle Linux aufgenommen" }, { "date": "2024-10-30T23:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-31T23:00:00.000+00:00", "number": "43", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-11-03T23:00:00.000+00:00", "number": "44", "summary": "Neue Updates von HCL aufgenommen" }, { "date": "2024-11-10T23:00:00.000+00:00", "number": "45", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-11-18T23:00:00.000+00:00", "number": "46", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2024-11-21T23:00:00.000+00:00", "number": "47", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2024-12-04T23:00:00.000+00:00", "number": "48", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-12-05T23:00:00.000+00:00", "number": "49", "summary": "Neue Updates von SonicWall aufgenommen" }, { "date": "2024-12-15T23:00:00.000+00:00", "number": "50", "summary": "Referenz(en) aufgenommen: 7178940, 7178937, 7178941, 7178939, 7178938" }, { "date": "2024-12-17T23:00:00.000+00:00", "number": "51", "summary": "Neue Updates von Dell und XEROX aufgenommen" }, { "date": "2025-01-12T23:00:00.000+00:00", "number": "52", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2025-01-19T23:00:00.000+00:00", "number": "53", "summary": "Neue Updates von HP aufgenommen" } ], "status": "final", "version": "53" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c2.4.60", "product": { "name": "Apache HTTP Server \u003c2.4.60", "product_id": "T035727" } }, { "category": "product_version", "name": "2.4.60", "product": { "name": "Apache HTTP Server 2.4.60", "product_id": "T035727-fixed", "product_identification_helper": { "cpe": "cpe:/a:apache:http_server:2.4.60" } } } ], "category": "product_name", "name": "HTTP Server" } ], "category": "vendor", "name": "Apache" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c3.8.1.3", "product": { "name": "Dell ECS \u003c3.8.1.3", "product_id": "T039899" } }, { "category": "product_version", "name": "3.8.1.3", "product": { "name": "Dell ECS 3.8.1.3", "product_id": "T039899-fixed", "product_identification_helper": { "cpe": "cpe:/h:dell:ecs:3.8.1.3" } } } ], "category": "product_name", "name": "ECS" }, { "branches": [ { "category": "product_version_range", "name": "\u003c19.10.0.5", "product": { "name": "Dell NetWorker \u003c19.10.0.5", "product_id": "T038270" } }, { "category": "product_version", "name": "19.10.0.5", "product": { "name": "Dell NetWorker 19.10.0.5", "product_id": "T038270-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:19.10.0.5" } } } ], "category": "product_name", "name": "NetWorker" }, { "branches": [ { "category": "product_name", "name": "Dell PowerScale", "product": { "name": "Dell PowerScale", "product_id": "T034610", "product_identification_helper": { "cpe": "cpe:/a:dell:powerscale_onefs:onefs" } } }, { "category": "product_version_range", "name": "OneFS \u003c9.8.0.1", "product": { "name": "Dell PowerScale OneFS \u003c9.8.0.1", "product_id": "T035762" } }, { "category": "product_version", "name": "OneFS 9.8.0.1", "product": { "name": "Dell PowerScale OneFS 9.8.0.1", "product_id": "T035762-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:powerscale_onefs:onefs__9.8.0.1" } } }, { "category": "product_version_range", "name": "OneFS \u003c9.4.0.20", "product": { "name": "Dell PowerScale OneFS \u003c9.4.0.20", "product_id": "T038705" } }, { "category": "product_version", "name": "OneFS 9.4.0.20", "product": { "name": "Dell PowerScale OneFS 9.4.0.20", "product_id": "T038705-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:powerscale_onefs:onefs__9.4.0.20" } } }, { "category": "product_version_range", "name": "OneFS \u003c9.5.1.1", "product": { "name": "Dell PowerScale OneFS \u003c9.5.1.1", "product_id": "T038706" } }, { "category": "product_version", "name": "OneFS 9.5.1.1", "product": { "name": "Dell PowerScale OneFS 9.5.1.1", "product_id": "T038706-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:powerscale_onefs:onefs__9.5.1.1" } } }, { "category": "product_version_range", "name": "OneFS \u003c9.7.1.3", "product": { "name": "Dell PowerScale OneFS \u003c9.7.1.3", "product_id": "T039585" } }, { "category": "product_version", "name": "OneFS 9.7.1.3", "product": { "name": "Dell PowerScale OneFS 9.7.1.3", "product_id": "T039585-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:powerscale_onefs:onefs__9.7.1.3" } } }, { "category": "product_version_range", "name": "OneFS \u003c9.9.0.1", "product": { "name": "Dell PowerScale OneFS \u003c9.9.0.1", "product_id": "T039586" } }, { "category": "product_version", "name": "OneFS 9.9.0.1", "product": { "name": "Dell PowerScale OneFS 9.9.0.1", "product_id": "T039586-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:powerscale_onefs:onefs__9.9.0.1" } } } ], "category": "product_name", "name": "PowerScale" } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "F5 BIG-IP", "product": { "name": "F5 BIG-IP", "product_id": "T001663", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:-" } } }, { "category": "product_version", "name": "17.1.0-17.1.1", "product": { "name": "F5 BIG-IP 17.1.0-17.1.1", "product_id": "T034899", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:17.1.0_-_17.1.1" } } }, { "category": "product_version", "name": "15.1.0-15.1.10", "product": { "name": "F5 BIG-IP 15.1.0-15.1.10", "product_id": "T034902", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:15.1.0_-_15.1.10" } } }, { "category": "product_version", "name": "16.1.0-16.1.5", "product": { "name": "F5 BIG-IP 16.1.0-16.1.5", "product_id": "T037028", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:16.1.0_-_16.1.5" } } } ], "category": "product_name", "name": "BIG-IP" } ], "category": "vendor", "name": "F5" }, { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "8.x", "product": { "name": "HCL Commerce 8.x", "product_id": "T038745", "product_identification_helper": { "cpe": "cpe:/a:hcltechsw:commerce:8.x" } } }, { "category": "product_version", "name": "9.0-9.0.1.21", "product": { "name": "HCL Commerce 9.0-9.0.1.21", "product_id": "T038746", "product_identification_helper": { "cpe": "cpe:/a:hcltechsw:commerce:9.0_-_9.0.1.21" } } }, { "category": "product_version", "name": "9.1.0-9.1.15", "product": { "name": "HCL Commerce 9.1.0-9.1.15", "product_id": "T038747", "product_identification_helper": { "cpe": "cpe:/a:hcltechsw:commerce:9.1.0_-_9.1.15" } } } ], "category": "product_name", "name": "Commerce" } ], "category": "vendor", "name": "HCL" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c11.31", "product": { "name": "HPE HP-UX \u003c11.31", "product_id": "T040402" } }, { "category": "product_version", "name": "11.31", "product": { "name": "HPE HP-UX 11.31", "product_id": "T040402-fixed", "product_identification_helper": { "cpe": "cpe:/o:hp:hp-ux:11.31" } } } ], "category": "product_name", "name": "HP-UX" } ], "category": "vendor", "name": "HPE" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Business Automation Workflow", "product": { "name": "IBM Business Automation Workflow", "product_id": "T019704", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:-" } } }, { "category": "product_version", "name": "24.0.0", "product": { "name": "IBM Business Automation Workflow 24.0.0", "product_id": "T036570", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:24.0.0" } } } ], "category": "product_name", "name": "Business Automation Workflow" }, { "branches": [ { "category": "product_version", "name": "8.5", "product": { "name": "IBM HTTP Server 8.5", "product_id": "T003676", "product_identification_helper": { "cpe": "cpe:/a:ibm:http_server:8.5" } } }, { "category": "product_version", "name": "9", "product": { "name": "IBM HTTP Server 9.0", "product_id": "T008162", "product_identification_helper": { "cpe": "cpe:/a:ibm:http_server:9.0" } } } ], "category": "product_name", "name": "HTTP Server" }, { "branches": [ { "category": "product_version_range", "name": "\u003c8.0.0.27", "product": { "name": "IBM Rational Build Forge \u003c8.0.0.27", "product_id": "T038286" } }, { "category": "product_version", "name": "8.0.0.27", "product": { "name": "IBM Rational Build Forge 8.0.0.27", "product_id": "T038286-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_build_forge:8.0.0.27" } } } ], "category": "product_name", "name": "Rational Build Forge" }, { "branches": [ { "category": "product_version", "name": "9.1-9.1.0.6", "product": { "name": "IBM Rational ClearQuest 9.1-9.1.0.6", "product_id": "T034074", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_clearquest:9.1_-_9.1.0.6" } } }, { "category": "product_version", "name": "10.0-10.0.5", "product": { "name": "IBM Rational ClearQuest 10.0-10.0.5", "product_id": "T034075", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_clearquest:10.0_-_10.0.5" } } } ], "category": "product_name", "name": "Rational ClearQuest" }, { "branches": [ { "category": "product_version", "name": "6.3.0.7", "product": { "name": "IBM Tivoli Monitoring 6.3.0.7", "product_id": "342008", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_monitoring:6.3.0.7" } } } ], "category": "product_name", "name": "Tivoli Monitoring" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c10.2.1.14-75sv", "product": { "name": "SonicWall SMA \u003c10.2.1.14-75sv", "product_id": "T039602" } }, { "category": "product_version", "name": "10.2.1.14-75sv", "product": { "name": "SonicWall SMA 10.2.1.14-75sv", "product_id": "T039602-fixed", "product_identification_helper": { "cpe": "cpe:/a:sonicwall:secure_mobile_access:10.2.1.14-75sv" } } } ], "category": "product_name", "name": "SMA" } ], "category": "vendor", "name": "SonicWall" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Xerox FreeFlow Print Server", "product": { "name": "Xerox FreeFlow Print Server", "product_id": "T010509", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:-" } } }, { "category": "product_version", "name": "v9", "product": { "name": "Xerox FreeFlow Print Server v9", "product_id": "T015632", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v9" } } }, { "category": "product_version", "name": "v9 for Solaris", "product": { "name": "Xerox FreeFlow Print Server v9 for Solaris", "product_id": "T028053", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v9_for_solaris" } } }, { "category": "product_version_range", "name": "\u003c9.0 SP-3 (93.M3.14.86)", "product": { "name": "Xerox FreeFlow Print Server \u003c9.0 SP-3 (93.M3.14.86)", "product_id": "T039896" } }, { "category": "product_version", "name": "9.0 SP-3 (93.M3.14.86)", "product": { "name": "Xerox FreeFlow Print Server 9.0 SP-3 (93.M3.14.86)", "product_id": "T039896-fixed", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:9.0_sp-3_%2893.m3.14.86%29" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-38709", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Apache HTTP Server. Diese Fehler bestehen in mehreren Komponenten wie dem Websocket, den Backreferences oder dem mod_rewrite Proxy-Handler, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einer NULL- Pointer-Dereferenz, einer serverseitigen Request Forgery oder einem Proxy-Codierungsproblem und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, die Authentifizierung zu umgehen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T038706", "T038747", "67646", "T034902", "T038746", "T038705", "T038745", "T039899", "T004914", "T039896", "T038286", "T001663", "398363", "342008", "T010509", "T034899", "T028053", "T034610", "T035727", "T003676", "T015632", "T034075", "T037028", "T012167", "T034074", "T039602", "T039586", "T032255", "T039585", "74185", "T035762", "T036570", "2951", "T002207", "T000126", "T019704", "T038270", "T040402", "T008162" ] }, "release_date": "2024-07-01T22:00:00.000+00:00", "title": "CVE-2023-38709" }, { "cve": "CVE-2024-36387", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Apache HTTP Server. Diese Fehler bestehen in mehreren Komponenten wie dem Websocket, den Backreferences oder dem mod_rewrite Proxy-Handler, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einer NULL- Pointer-Dereferenz, einer serverseitigen Request Forgery oder einem Proxy-Codierungsproblem und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, die Authentifizierung zu umgehen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T038706", "T038747", "67646", "T034902", "T038746", "T038705", "T038745", "T039899", "T004914", "T039896", "T038286", "T001663", "398363", "342008", "T010509", "T034899", "T028053", "T034610", "T035727", "T003676", "T015632", "T034075", "T037028", "T012167", "T034074", "T039602", "T039586", "T032255", "T039585", "74185", "T035762", "T036570", "2951", "T002207", "T000126", "T019704", "T038270", "T040402", "T008162" ] }, "release_date": "2024-07-01T22:00:00.000+00:00", "title": "CVE-2024-36387" }, { "cve": "CVE-2024-38472", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Apache HTTP Server. Diese Fehler bestehen in mehreren Komponenten wie dem Websocket, den Backreferences oder dem mod_rewrite Proxy-Handler, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einer NULL- Pointer-Dereferenz, einer serverseitigen Request Forgery oder einem Proxy-Codierungsproblem und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, die Authentifizierung zu umgehen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T038706", "T038747", "67646", "T034902", "T038746", "T038705", "T038745", "T039899", "T004914", "T039896", "T038286", "T001663", "398363", "342008", "T010509", "T034899", "T028053", "T034610", "T035727", "T003676", "T015632", "T034075", "T037028", "T012167", "T034074", "T039602", "T039586", "T032255", "T039585", "74185", "T035762", "T036570", "2951", "T002207", "T000126", "T019704", "T038270", "T040402", "T008162" ] }, "release_date": "2024-07-01T22:00:00.000+00:00", "title": "CVE-2024-38472" }, { "cve": "CVE-2024-38473", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Apache HTTP Server. Diese Fehler bestehen in mehreren Komponenten wie dem Websocket, den Backreferences oder dem mod_rewrite Proxy-Handler, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einer NULL- Pointer-Dereferenz, einer serverseitigen Request Forgery oder einem Proxy-Codierungsproblem und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, die Authentifizierung zu umgehen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T038706", "T038747", "67646", "T034902", "T038746", "T038705", "T038745", "T039899", "T004914", "T039896", "T038286", "T001663", "398363", "342008", "T010509", "T034899", "T028053", "T034610", "T035727", "T003676", "T015632", "T034075", "T037028", "T012167", "T034074", "T039602", "T039586", "T032255", "T039585", "74185", "T035762", "T036570", "2951", "T002207", "T000126", "T019704", "T038270", "T040402", "T008162" ] }, "release_date": "2024-07-01T22:00:00.000+00:00", "title": "CVE-2024-38473" }, { "cve": "CVE-2024-38474", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Apache HTTP Server. Diese Fehler bestehen in mehreren Komponenten wie dem Websocket, den Backreferences oder dem mod_rewrite Proxy-Handler, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einer NULL- Pointer-Dereferenz, einer serverseitigen Request Forgery oder einem Proxy-Codierungsproblem und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, die Authentifizierung zu umgehen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T038706", "T038747", "67646", "T034902", "T038746", "T038705", "T038745", "T039899", "T004914", "T039896", "T038286", "T001663", "398363", "342008", "T010509", "T034899", "T028053", "T034610", "T035727", "T003676", "T015632", "T034075", "T037028", "T012167", "T034074", "T039602", "T039586", "T032255", "T039585", "74185", "T035762", "T036570", "2951", "T002207", "T000126", "T019704", "T038270", "T040402", "T008162" ] }, "release_date": "2024-07-01T22:00:00.000+00:00", "title": "CVE-2024-38474" }, { "cve": "CVE-2024-38475", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Apache HTTP Server. Diese Fehler bestehen in mehreren Komponenten wie dem Websocket, den Backreferences oder dem mod_rewrite Proxy-Handler, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einer NULL- Pointer-Dereferenz, einer serverseitigen Request Forgery oder einem Proxy-Codierungsproblem und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, die Authentifizierung zu umgehen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T038706", "T038747", "67646", "T034902", "T038746", "T038705", "T038745", "T039899", "T004914", "T039896", "T038286", "T001663", "398363", "342008", "T010509", "T034899", "T028053", "T034610", "T035727", "T003676", "T015632", "T034075", "T037028", "T012167", "T034074", "T039602", "T039586", "T032255", "T039585", "74185", "T035762", "T036570", "2951", "T002207", "T000126", "T019704", "T038270", "T040402", "T008162" ] }, "release_date": "2024-07-01T22:00:00.000+00:00", "title": "CVE-2024-38475" }, { "cve": "CVE-2024-38476", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Apache HTTP Server. Diese Fehler bestehen in mehreren Komponenten wie dem Websocket, den Backreferences oder dem mod_rewrite Proxy-Handler, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einer NULL- Pointer-Dereferenz, einer serverseitigen Request Forgery oder einem Proxy-Codierungsproblem und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, die Authentifizierung zu umgehen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T038706", "T038747", "67646", "T034902", "T038746", "T038705", "T038745", "T039899", "T004914", "T039896", "T038286", "T001663", "398363", "342008", "T010509", "T034899", "T028053", "T034610", "T035727", "T003676", "T015632", "T034075", "T037028", "T012167", "T034074", "T039602", "T039586", "T032255", "T039585", "74185", "T035762", "T036570", "2951", "T002207", "T000126", "T019704", "T038270", "T040402", "T008162" ] }, "release_date": "2024-07-01T22:00:00.000+00:00", "title": "CVE-2024-38476" }, { "cve": "CVE-2024-38477", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Apache HTTP Server. Diese Fehler bestehen in mehreren Komponenten wie dem Websocket, den Backreferences oder dem mod_rewrite Proxy-Handler, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einer NULL- Pointer-Dereferenz, einer serverseitigen Request Forgery oder einem Proxy-Codierungsproblem und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, die Authentifizierung zu umgehen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T038706", "T038747", "67646", "T034902", "T038746", "T038705", "T038745", "T039899", "T004914", "T039896", "T038286", "T001663", "398363", "342008", "T010509", "T034899", "T028053", "T034610", "T035727", "T003676", "T015632", "T034075", "T037028", "T012167", "T034074", "T039602", "T039586", "T032255", "T039585", "74185", "T035762", "T036570", "2951", "T002207", "T000126", "T019704", "T038270", "T040402", "T008162" ] }, "release_date": "2024-07-01T22:00:00.000+00:00", "title": "CVE-2024-38477" }, { "cve": "CVE-2024-39573", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Apache HTTP Server. Diese Fehler bestehen in mehreren Komponenten wie dem Websocket, den Backreferences oder dem mod_rewrite Proxy-Handler, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einer NULL- Pointer-Dereferenz, einer serverseitigen Request Forgery oder einem Proxy-Codierungsproblem und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, die Authentifizierung zu umgehen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T038706", "T038747", "67646", "T034902", "T038746", "T038705", "T038745", "T039899", "T004914", "T039896", "T038286", "T001663", "398363", "342008", "T010509", "T034899", "T028053", "T034610", "T035727", "T003676", "T015632", "T034075", "T037028", "T012167", "T034074", "T039602", "T039586", "T032255", "T039585", "74185", "T035762", "T036570", "2951", "T002207", "T000126", "T019704", "T038270", "T040402", "T008162" ] }, "release_date": "2024-07-01T22:00:00.000+00:00", "title": "CVE-2024-39573" } ] }
WID-SEC-W-2024-1504
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Apache ist ein Webserver f\u00fcr verschiedene Plattformen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apache HTTP Server ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder vertrauliche Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1504 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1504.json" }, { "category": "self", "summary": "WID-SEC-2024-1504 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1504" }, { "category": "external", "summary": "Apache Advisory vom 2024-07-01", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" }, { "category": "external", "summary": "Red Hat Bugzilla vom 2024-07-01", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295006" }, { "category": "external", "summary": "Red Hat Bugzilla vom 2024-07-01", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "Red Hat Bugzilla vom 2024-07-01", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "Red Hat Bugzilla vom 2024-07-01", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "Red Hat Bugzilla vom 2024-07-01", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "Red Hat Bugzilla vom 2024-07-01", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295018" }, { "category": "external", "summary": "Red Hat Bugzilla vom 2024-07-01", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "external", "summary": "Apache HTTP Server", "url": "https://seclists.org/oss-sec/2024/q3/8" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:4197 vom 2024-07-02", "url": "https://errata.build.resf.org/RLSA-2024:4197" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-39F1A828ED vom 2024-07-03", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-39f1a828ed" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-E7E73BEFAD vom 2024-07-03", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-e7e73befad" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6885-1 vom 2024-07-08", "url": "https://ubuntu.com/security/notices/USN-6885-1" }, { "category": "external", "summary": "IBM Security Bulletin 7159849 vom 2024-07-09", "url": "https://www.ibm.com/support/pages/node/7159849" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-661BB6322D vom 2024-07-11", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-661bb6322d" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-CB8ACBF644 vom 2024-07-11", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-cb8acbf644" }, { "category": "external", "summary": "IBM Security Bulletin 7160019 vom 2024-07-11", "url": "https://www.ibm.com/support/pages/node/7160019" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2405-1 vom 2024-07-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018934.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5729 vom 2024-07-12", "url": "https://lists.debian.org/debian-security-announce/2024/msg00140.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6885-2 vom 2024-07-11", "url": "https://ubuntu.com/security/notices/USN-6885-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2560-1 vom 2024-07-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/019002.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2594 vom 2024-07-23", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2594.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2591-1 vom 2024-07-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/019006.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2597-1 vom 2024-07-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/019023.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-4726 vom 2024-07-24", "url": "https://linux.oracle.com/errata/ELSA-2024-4726.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4719 vom 2024-07-23", "url": "https://access.redhat.com/errata/RHSA-2024:4719" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4720 vom 2024-07-23", "url": "https://access.redhat.com/errata/RHSA-2024:4720" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4726 vom 2024-07-23", "url": "https://access.redhat.com/errata/RHSA-2024:4726" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-4720 vom 2024-07-24", "url": "https://linux.oracle.com/errata/ELSA-2024-4720.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-1944 vom 2024-07-24", "url": "https://alas.aws.amazon.com/ALAS-2024-1944.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4827 vom 2024-07-24", "url": "https://access.redhat.com/errata/RHSA-2024:4827" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4830 vom 2024-07-24", "url": "https://access.redhat.com/errata/RHSA-2024:4830" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4820 vom 2024-07-24", "url": "https://access.redhat.com/errata/RHSA-2024:4820" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4862 vom 2024-07-25", "url": "https://access.redhat.com/errata/RHSA-2024:4862" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4863 vom 2024-07-25", "url": "https://access.redhat.com/errata/RHSA-2024:4863" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:4726 vom 2024-07-26", "url": "https://errata.build.resf.org/RLSA-2024:4726" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2624-1 vom 2024-07-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/019050.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4938 vom 2024-07-31", "url": "https://access.redhat.com/errata/RHSA-2024:4938" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4943 vom 2024-07-31", "url": "https://access.redhat.com/errata/RHSA-2024:4943" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-E83AF0855E vom 2024-08-01", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-e83af0855e" }, { "category": "external", "summary": "F5 Security Advisory K000140505 vom 2024-08-03", "url": "https://my.f5.com/manage/s/article/K000140505" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5001 vom 2024-08-05", "url": "https://access.redhat.com/errata/RHSA-2024:5001" }, { "category": "external", "summary": "F5 Security Advisory K000140620 vom 2024-08-08", "url": "https://my.f5.com/manage/s/article/K000140620" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5138 vom 2024-08-08", "url": "https://access.redhat.com/errata/RHSA-2024:5138" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-5138 vom 2024-08-09", "url": "https://linux.oracle.com/errata/ELSA-2024-5138.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5193 vom 2024-08-12", "url": "https://access.redhat.com/errata/RHSA-2024:5193" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5239 vom 2024-08-13", "url": "https://access.redhat.com/errata/RHSA-2024:5239" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5240 vom 2024-08-13", "url": "https://access.redhat.com/errata/RHSA-2024:5240" }, { "category": "external", "summary": "F5 Security Advisory K000140693 vom 2024-08-13", "url": "https://my.f5.com/manage/s/article/K000140693" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-5193 vom 2024-08-14", "url": "https://linux.oracle.com/errata/ELSA-2024-5193.html" }, { "category": "external", "summary": "IBM Security Bulletin 7165827 vom 2024-08-19", "url": "https://www.ibm.com/support/pages/node/7165827" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2436-1 vom 2024-08-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019226.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2997-1 vom 2024-08-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019299.html" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:5138 vom 2024-08-21", "url": "https://errata.build.resf.org/RLSA-2024:5138" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:5193 vom 2024-08-21", "url": "https://errata.build.resf.org/RLSA-2024:5193" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2999-1 vom 2024-08-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019301.html" }, { "category": "external", "summary": "F5 Security Advisory K000140784 vom 2024-08-23", "url": "https://my.f5.com/manage/s/article/K000140784" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5812 vom 2024-08-26", "url": "https://access.redhat.com/errata/RHSA-2024:5812" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5832 vom 2024-08-26", "url": "https://access.redhat.com/errata/RHSA-2024:5832" }, { "category": "external", "summary": "DELL Security Update for Dell PowerScale OneFS", "url": "https://www.dell.com/support/kbdoc/en-us/000228207/dsa-2024-346-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6136 vom 2024-09-03", "url": "https://access.redhat.com/errata/RHSA-2024:6136" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6004 vom 2024-09-04", "url": "https://access.redhat.com/errata/RHSA-2024:6004" }, { "category": "external", "summary": "IBM Security Bulletin 7166853 vom 2024-09-05", "url": "https://www.ibm.com/support/pages/node/7166853" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6013 vom 2024-09-05", "url": "https://access.redhat.com/errata/RHSA-2024:6013" }, { "category": "external", "summary": "IBM Security Bulletin 7167662 vom 2024-09-05", "url": "https://www.ibm.com/support/pages/node/7167662" }, { "category": "external", "summary": "XEROX Security Advisory XRX24-013 vom 2024-09-05", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2024/09/Xerox-Security-Bulletin-XRX24-013-for-Xerox-FreeFlow-Print-Server-v2-_Windows10.pdf" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6468 vom 2024-09-09", "url": "https://access.redhat.com/errata/RHSA-2024:6468" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6467 vom 2024-09-09", "url": "https://access.redhat.com/errata/RHSA-2024:6467" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3173-1 vom 2024-09-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019389.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3172-1 vom 2024-09-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019390.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6584 vom 2024-09-11", "url": "https://access.redhat.com/errata/RHSA-2024:6584" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6583 vom 2024-09-11", "url": "https://access.redhat.com/errata/RHSA-2024:6583" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-4943 vom 2024-09-14", "url": "https://linux.oracle.com/errata/ELSA-2024-4943.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6885-3 vom 2024-09-18", "url": "https://ubuntu.com/security/notices/USN-6885-3" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6928 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:6928" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6927 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:6927" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7101 vom 2024-09-25", "url": "https://access.redhat.com/errata/RHSA-2024:7101" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202409-31 vom 2024-09-28", "url": "https://security.gentoo.org/glsa/202409-31" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-423 vom 2024-10-11", "url": "https://www.dell.com/support/kbdoc/de-de/000235068/dsa-2024-423-security-update-for-dell-networker-and-networker-management-console-nmc-multiple-component-vulnerabilities" }, { "category": "external", "summary": "IBM Security Bulletin 7173018 vom 2024-10-14", "url": "https://www.ibm.com/support/pages/node/7173018" }, { "category": "external", "summary": "Debian Security Advisory DLA-3921 vom 2024-10-17", "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00013.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-7101 vom 2024-10-17", "url": "https://linux.oracle.com/errata/ELSA-2024-7101.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8680 vom 2024-10-31", "url": "https://access.redhat.com/errata/RHSA-2024:8680" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-8680 vom 2024-10-31", "url": "http://linux.oracle.com/errata/ELSA-2024-8680.html" }, { "category": "external", "summary": "HCL Security Advisory", "url": "https://support.hcl-software.com/csm?id=kb_article\u0026sysparm_article=KB0115052" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:8680 vom 2024-11-08", "url": "https://errata.build.resf.org/RLSA-2024:8680" }, { "category": "external", "summary": "XEROX Security Advisory XRX24-016 vom 2024-11-18", "url": "https://security.business.xerox.com/wp-content/uploads/2024/11/Xerox%C2%AE-Security-Bulletin-XRX24-016-for-Xerox%C2%AEFreeFlow%C2%AE-Print-Server-v9.pdf" }, { "category": "external", "summary": "XEROX Security Advisory XRX24-017 vom 2024-11-21", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2024/11/Xerox-Security-Bulletin-XRX24-017-for-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-453 vom 2024-12-05", "url": "https://www.dell.com/support/kbdoc/de-de/000256645/dsa-2024-453-security-update-for-dell-powerscale-onefs-multiple-security-vulnerabilities" }, { "category": "external", "summary": "SonicWall Security Advisory SNWLID-2024-0018 vom 2024-12-06", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0018" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-483 vom 2024-12-18", "url": "https://www.dell.com/support/kbdoc/de-de/000256642/dsa-2024-483-security-update-for-dell-ecs-multiple-vulnerabilities" }, { "category": "external", "summary": "XEROX Security Advisory XRX24-019 vom 2024-12-17", "url": "https://security.business.xerox.com/wp-content/uploads/2024/12/Xerox-Security-Bulletin-XRX24-019-for-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf" }, { "category": "external", "summary": "XEROX Security Advisory XRX25-001 vom 2025-01-13", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/01/Xerox-Security-Bulletin-XRX25-001-for-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf" }, { "category": "external", "summary": "HPE Security Bulletin vom 2025-01-17", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbux04773en_us\u0026docLocale=en_US" } ], "source_lang": "en-US", "title": "Apache HTTP Server: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-01-19T23:00:00.000+00:00", "generator": { "date": "2025-01-20T09:21:02.020+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2024-1504", "initial_release_date": "2024-07-01T22:00:00.000+00:00", "revision_history": [ { "date": "2024-07-01T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-07-02T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-07-03T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2024-07-08T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-07-09T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von IBM und IBM-APAR aufgenommen" }, { "date": "2024-07-11T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Fedora, IBM, SUSE, Debian und Ubuntu aufgenommen" }, { "date": "2024-07-18T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-07-22T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Amazon und SUSE aufgenommen" }, { "date": "2024-07-23T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2024-07-24T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Amazon und Red Hat aufgenommen" }, { "date": "2024-07-25T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-07-28T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-07-29T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-07-31T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-08-01T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2024-08-04T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von F5 aufgenommen" }, { "date": "2024-08-07T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von F5 aufgenommen" }, { "date": "2024-08-08T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-08-11T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2024-08-13T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat und F5 aufgenommen" }, { "date": "2024-08-14T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-08-18T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-08-19T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-08-21T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von SUSE und Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-08-22T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-08-25T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von F5 aufgenommen" }, { "date": "2024-09-01T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-09-02T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-03T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-05T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von IBM, Red Hat und XEROX aufgenommen" }, { "date": "2024-09-08T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-09T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-09-11T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-15T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-09-18T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-09-24T22:00:00.000+00:00", "number": "36", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-25T22:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-29T22:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2024-10-10T22:00:00.000+00:00", "number": "39", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-10-13T22:00:00.000+00:00", "number": "40", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-10-17T22:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Debian und Oracle Linux aufgenommen" }, { "date": "2024-10-30T23:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-31T23:00:00.000+00:00", "number": "43", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-11-03T23:00:00.000+00:00", "number": "44", "summary": "Neue Updates von HCL aufgenommen" }, { "date": "2024-11-10T23:00:00.000+00:00", "number": "45", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-11-18T23:00:00.000+00:00", "number": "46", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2024-11-21T23:00:00.000+00:00", "number": "47", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2024-12-04T23:00:00.000+00:00", "number": "48", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-12-05T23:00:00.000+00:00", "number": "49", "summary": "Neue Updates von SonicWall aufgenommen" }, { "date": "2024-12-15T23:00:00.000+00:00", "number": "50", "summary": "Referenz(en) aufgenommen: 7178940, 7178937, 7178941, 7178939, 7178938" }, { "date": "2024-12-17T23:00:00.000+00:00", "number": "51", "summary": "Neue Updates von Dell und XEROX aufgenommen" }, { "date": "2025-01-12T23:00:00.000+00:00", "number": "52", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2025-01-19T23:00:00.000+00:00", "number": "53", "summary": "Neue Updates von HP aufgenommen" } ], "status": "final", "version": "53" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c2.4.60", "product": { "name": "Apache HTTP Server \u003c2.4.60", "product_id": "T035727" } }, { "category": "product_version", "name": "2.4.60", "product": { "name": "Apache HTTP Server 2.4.60", "product_id": "T035727-fixed", "product_identification_helper": { "cpe": "cpe:/a:apache:http_server:2.4.60" } } } ], "category": "product_name", "name": "HTTP Server" } ], "category": "vendor", "name": "Apache" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c3.8.1.3", "product": { "name": "Dell ECS \u003c3.8.1.3", "product_id": "T039899" } }, { "category": "product_version", "name": "3.8.1.3", "product": { "name": "Dell ECS 3.8.1.3", "product_id": "T039899-fixed", "product_identification_helper": { "cpe": "cpe:/h:dell:ecs:3.8.1.3" } } } ], "category": "product_name", "name": "ECS" }, { "branches": [ { "category": "product_version_range", "name": "\u003c19.10.0.5", "product": { "name": "Dell NetWorker \u003c19.10.0.5", "product_id": "T038270" } }, { "category": "product_version", "name": "19.10.0.5", "product": { "name": "Dell NetWorker 19.10.0.5", "product_id": "T038270-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:19.10.0.5" } } } ], "category": "product_name", "name": "NetWorker" }, { "branches": [ { "category": "product_name", "name": "Dell PowerScale", "product": { "name": "Dell PowerScale", "product_id": "T034610", "product_identification_helper": { "cpe": "cpe:/a:dell:powerscale_onefs:onefs" } } }, { "category": "product_version_range", "name": "OneFS \u003c9.8.0.1", "product": { "name": "Dell PowerScale OneFS \u003c9.8.0.1", "product_id": "T035762" } }, { "category": "product_version", "name": "OneFS 9.8.0.1", "product": { "name": "Dell PowerScale OneFS 9.8.0.1", "product_id": "T035762-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:powerscale_onefs:onefs__9.8.0.1" } } }, { "category": "product_version_range", "name": "OneFS \u003c9.4.0.20", "product": { "name": "Dell PowerScale OneFS \u003c9.4.0.20", "product_id": "T038705" } }, { "category": "product_version", "name": "OneFS 9.4.0.20", "product": { "name": "Dell PowerScale OneFS 9.4.0.20", "product_id": "T038705-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:powerscale_onefs:onefs__9.4.0.20" } } }, { "category": "product_version_range", "name": "OneFS \u003c9.5.1.1", "product": { "name": "Dell PowerScale OneFS \u003c9.5.1.1", "product_id": "T038706" } }, { "category": "product_version", "name": "OneFS 9.5.1.1", "product": { "name": "Dell PowerScale OneFS 9.5.1.1", "product_id": "T038706-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:powerscale_onefs:onefs__9.5.1.1" } } }, { "category": "product_version_range", "name": "OneFS \u003c9.7.1.3", "product": { "name": "Dell PowerScale OneFS \u003c9.7.1.3", "product_id": "T039585" } }, { "category": "product_version", "name": "OneFS 9.7.1.3", "product": { "name": "Dell PowerScale OneFS 9.7.1.3", "product_id": "T039585-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:powerscale_onefs:onefs__9.7.1.3" } } }, { "category": "product_version_range", "name": "OneFS \u003c9.9.0.1", "product": { "name": "Dell PowerScale OneFS \u003c9.9.0.1", "product_id": "T039586" } }, { "category": "product_version", "name": "OneFS 9.9.0.1", "product": { "name": "Dell PowerScale OneFS 9.9.0.1", "product_id": "T039586-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:powerscale_onefs:onefs__9.9.0.1" } } } ], "category": "product_name", "name": "PowerScale" } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "F5 BIG-IP", "product": { "name": "F5 BIG-IP", "product_id": "T001663", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:-" } } }, { "category": "product_version", "name": "17.1.0-17.1.1", "product": { "name": "F5 BIG-IP 17.1.0-17.1.1", "product_id": "T034899", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:17.1.0_-_17.1.1" } } }, { "category": "product_version", "name": "15.1.0-15.1.10", "product": { "name": "F5 BIG-IP 15.1.0-15.1.10", "product_id": "T034902", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:15.1.0_-_15.1.10" } } }, { "category": "product_version", "name": "16.1.0-16.1.5", "product": { "name": "F5 BIG-IP 16.1.0-16.1.5", "product_id": "T037028", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:16.1.0_-_16.1.5" } } } ], "category": "product_name", "name": "BIG-IP" } ], "category": "vendor", "name": "F5" }, { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "8.x", "product": { "name": "HCL Commerce 8.x", "product_id": "T038745", "product_identification_helper": { "cpe": "cpe:/a:hcltechsw:commerce:8.x" } } }, { "category": "product_version", "name": "9.0-9.0.1.21", "product": { "name": "HCL Commerce 9.0-9.0.1.21", "product_id": "T038746", "product_identification_helper": { "cpe": "cpe:/a:hcltechsw:commerce:9.0_-_9.0.1.21" } } }, { "category": "product_version", "name": "9.1.0-9.1.15", "product": { "name": "HCL Commerce 9.1.0-9.1.15", "product_id": "T038747", "product_identification_helper": { "cpe": "cpe:/a:hcltechsw:commerce:9.1.0_-_9.1.15" } } } ], "category": "product_name", "name": "Commerce" } ], "category": "vendor", "name": "HCL" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c11.31", "product": { "name": "HPE HP-UX \u003c11.31", "product_id": "T040402" } }, { "category": "product_version", "name": "11.31", "product": { "name": "HPE HP-UX 11.31", "product_id": "T040402-fixed", "product_identification_helper": { "cpe": "cpe:/o:hp:hp-ux:11.31" } } } ], "category": "product_name", "name": "HP-UX" } ], "category": "vendor", "name": "HPE" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Business Automation Workflow", "product": { "name": "IBM Business Automation Workflow", "product_id": "T019704", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:-" } } }, { "category": "product_version", "name": "24.0.0", "product": { "name": "IBM Business Automation Workflow 24.0.0", "product_id": "T036570", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:24.0.0" } } } ], "category": "product_name", "name": "Business Automation Workflow" }, { "branches": [ { "category": "product_version", "name": "8.5", "product": { "name": "IBM HTTP Server 8.5", "product_id": "T003676", "product_identification_helper": { "cpe": "cpe:/a:ibm:http_server:8.5" } } }, { "category": "product_version", "name": "9", "product": { "name": "IBM HTTP Server 9.0", "product_id": "T008162", "product_identification_helper": { "cpe": "cpe:/a:ibm:http_server:9.0" } } } ], "category": "product_name", "name": "HTTP Server" }, { "branches": [ { "category": "product_version_range", "name": "\u003c8.0.0.27", "product": { "name": "IBM Rational Build Forge \u003c8.0.0.27", "product_id": "T038286" } }, { "category": "product_version", "name": "8.0.0.27", "product": { "name": "IBM Rational Build Forge 8.0.0.27", "product_id": "T038286-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_build_forge:8.0.0.27" } } } ], "category": "product_name", "name": "Rational Build Forge" }, { "branches": [ { "category": "product_version", "name": "9.1-9.1.0.6", "product": { "name": "IBM Rational ClearQuest 9.1-9.1.0.6", "product_id": "T034074", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_clearquest:9.1_-_9.1.0.6" } } }, { "category": "product_version", "name": "10.0-10.0.5", "product": { "name": "IBM Rational ClearQuest 10.0-10.0.5", "product_id": "T034075", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_clearquest:10.0_-_10.0.5" } } } ], "category": "product_name", "name": "Rational ClearQuest" }, { "branches": [ { "category": "product_version", "name": "6.3.0.7", "product": { "name": "IBM Tivoli Monitoring 6.3.0.7", "product_id": "342008", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_monitoring:6.3.0.7" } } } ], "category": "product_name", "name": "Tivoli Monitoring" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c10.2.1.14-75sv", "product": { "name": "SonicWall SMA \u003c10.2.1.14-75sv", "product_id": "T039602" } }, { "category": "product_version", "name": "10.2.1.14-75sv", "product": { "name": "SonicWall SMA 10.2.1.14-75sv", "product_id": "T039602-fixed", "product_identification_helper": { "cpe": "cpe:/a:sonicwall:secure_mobile_access:10.2.1.14-75sv" } } } ], "category": "product_name", "name": "SMA" } ], "category": "vendor", "name": "SonicWall" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Xerox FreeFlow Print Server", "product": { "name": "Xerox FreeFlow Print Server", "product_id": "T010509", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:-" } } }, { "category": "product_version", "name": "v9", "product": { "name": "Xerox FreeFlow Print Server v9", "product_id": "T015632", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v9" } } }, { "category": "product_version", "name": "v9 for Solaris", "product": { "name": "Xerox FreeFlow Print Server v9 for Solaris", "product_id": "T028053", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v9_for_solaris" } } }, { "category": "product_version_range", "name": "\u003c9.0 SP-3 (93.M3.14.86)", "product": { "name": "Xerox FreeFlow Print Server \u003c9.0 SP-3 (93.M3.14.86)", "product_id": "T039896" } }, { "category": "product_version", "name": "9.0 SP-3 (93.M3.14.86)", "product": { "name": "Xerox FreeFlow Print Server 9.0 SP-3 (93.M3.14.86)", "product_id": "T039896-fixed", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:9.0_sp-3_%2893.m3.14.86%29" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-38709", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Apache HTTP Server. Diese Fehler bestehen in mehreren Komponenten wie dem Websocket, den Backreferences oder dem mod_rewrite Proxy-Handler, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einer NULL- Pointer-Dereferenz, einer serverseitigen Request Forgery oder einem Proxy-Codierungsproblem und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, die Authentifizierung zu umgehen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T038706", "T038747", "67646", "T034902", "T038746", "T038705", "T038745", "T039899", "T004914", "T039896", "T038286", "T001663", "398363", "342008", "T010509", "T034899", "T028053", "T034610", "T035727", "T003676", "T015632", "T034075", "T037028", "T012167", "T034074", "T039602", "T039586", "T032255", "T039585", "74185", "T035762", "T036570", "2951", "T002207", "T000126", "T019704", "T038270", "T040402", "T008162" ] }, "release_date": "2024-07-01T22:00:00.000+00:00", "title": "CVE-2023-38709" }, { "cve": "CVE-2024-36387", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Apache HTTP Server. Diese Fehler bestehen in mehreren Komponenten wie dem Websocket, den Backreferences oder dem mod_rewrite Proxy-Handler, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einer NULL- Pointer-Dereferenz, einer serverseitigen Request Forgery oder einem Proxy-Codierungsproblem und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, die Authentifizierung zu umgehen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T038706", "T038747", "67646", "T034902", "T038746", "T038705", "T038745", "T039899", "T004914", "T039896", "T038286", "T001663", "398363", "342008", "T010509", "T034899", "T028053", "T034610", "T035727", "T003676", "T015632", "T034075", "T037028", "T012167", "T034074", "T039602", "T039586", "T032255", "T039585", "74185", "T035762", "T036570", "2951", "T002207", "T000126", "T019704", "T038270", "T040402", "T008162" ] }, "release_date": "2024-07-01T22:00:00.000+00:00", "title": "CVE-2024-36387" }, { "cve": "CVE-2024-38472", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Apache HTTP Server. Diese Fehler bestehen in mehreren Komponenten wie dem Websocket, den Backreferences oder dem mod_rewrite Proxy-Handler, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einer NULL- Pointer-Dereferenz, einer serverseitigen Request Forgery oder einem Proxy-Codierungsproblem und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, die Authentifizierung zu umgehen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T038706", "T038747", "67646", "T034902", "T038746", "T038705", "T038745", "T039899", "T004914", "T039896", "T038286", "T001663", "398363", "342008", "T010509", "T034899", "T028053", "T034610", "T035727", "T003676", "T015632", "T034075", "T037028", "T012167", "T034074", "T039602", "T039586", "T032255", "T039585", "74185", "T035762", "T036570", "2951", "T002207", "T000126", "T019704", "T038270", "T040402", "T008162" ] }, "release_date": "2024-07-01T22:00:00.000+00:00", "title": "CVE-2024-38472" }, { "cve": "CVE-2024-38473", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Apache HTTP Server. Diese Fehler bestehen in mehreren Komponenten wie dem Websocket, den Backreferences oder dem mod_rewrite Proxy-Handler, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einer NULL- Pointer-Dereferenz, einer serverseitigen Request Forgery oder einem Proxy-Codierungsproblem und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, die Authentifizierung zu umgehen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T038706", "T038747", "67646", "T034902", "T038746", "T038705", "T038745", "T039899", "T004914", "T039896", "T038286", "T001663", "398363", "342008", "T010509", "T034899", "T028053", "T034610", "T035727", "T003676", "T015632", "T034075", "T037028", "T012167", "T034074", "T039602", "T039586", "T032255", "T039585", "74185", "T035762", "T036570", "2951", "T002207", "T000126", "T019704", "T038270", "T040402", "T008162" ] }, "release_date": "2024-07-01T22:00:00.000+00:00", "title": "CVE-2024-38473" }, { "cve": "CVE-2024-38474", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Apache HTTP Server. Diese Fehler bestehen in mehreren Komponenten wie dem Websocket, den Backreferences oder dem mod_rewrite Proxy-Handler, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einer NULL- Pointer-Dereferenz, einer serverseitigen Request Forgery oder einem Proxy-Codierungsproblem und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, die Authentifizierung zu umgehen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T038706", "T038747", "67646", "T034902", "T038746", "T038705", "T038745", "T039899", "T004914", "T039896", "T038286", "T001663", "398363", "342008", "T010509", "T034899", "T028053", "T034610", "T035727", "T003676", "T015632", "T034075", "T037028", "T012167", "T034074", "T039602", "T039586", "T032255", "T039585", "74185", "T035762", "T036570", "2951", "T002207", "T000126", "T019704", "T038270", "T040402", "T008162" ] }, "release_date": "2024-07-01T22:00:00.000+00:00", "title": "CVE-2024-38474" }, { "cve": "CVE-2024-38475", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Apache HTTP Server. Diese Fehler bestehen in mehreren Komponenten wie dem Websocket, den Backreferences oder dem mod_rewrite Proxy-Handler, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einer NULL- Pointer-Dereferenz, einer serverseitigen Request Forgery oder einem Proxy-Codierungsproblem und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, die Authentifizierung zu umgehen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T038706", "T038747", "67646", "T034902", "T038746", "T038705", "T038745", "T039899", "T004914", "T039896", "T038286", "T001663", "398363", "342008", "T010509", "T034899", "T028053", "T034610", "T035727", "T003676", "T015632", "T034075", "T037028", "T012167", "T034074", "T039602", "T039586", "T032255", "T039585", "74185", "T035762", "T036570", "2951", "T002207", "T000126", "T019704", "T038270", "T040402", "T008162" ] }, "release_date": "2024-07-01T22:00:00.000+00:00", "title": "CVE-2024-38475" }, { "cve": "CVE-2024-38476", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Apache HTTP Server. Diese Fehler bestehen in mehreren Komponenten wie dem Websocket, den Backreferences oder dem mod_rewrite Proxy-Handler, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einer NULL- Pointer-Dereferenz, einer serverseitigen Request Forgery oder einem Proxy-Codierungsproblem und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, die Authentifizierung zu umgehen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T038706", "T038747", "67646", "T034902", "T038746", "T038705", "T038745", "T039899", "T004914", "T039896", "T038286", "T001663", "398363", "342008", "T010509", "T034899", "T028053", "T034610", "T035727", "T003676", "T015632", "T034075", "T037028", "T012167", "T034074", "T039602", "T039586", "T032255", "T039585", "74185", "T035762", "T036570", "2951", "T002207", "T000126", "T019704", "T038270", "T040402", "T008162" ] }, "release_date": "2024-07-01T22:00:00.000+00:00", "title": "CVE-2024-38476" }, { "cve": "CVE-2024-38477", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Apache HTTP Server. Diese Fehler bestehen in mehreren Komponenten wie dem Websocket, den Backreferences oder dem mod_rewrite Proxy-Handler, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einer NULL- Pointer-Dereferenz, einer serverseitigen Request Forgery oder einem Proxy-Codierungsproblem und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, die Authentifizierung zu umgehen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T038706", "T038747", "67646", "T034902", "T038746", "T038705", "T038745", "T039899", "T004914", "T039896", "T038286", "T001663", "398363", "342008", "T010509", "T034899", "T028053", "T034610", "T035727", "T003676", "T015632", "T034075", "T037028", "T012167", "T034074", "T039602", "T039586", "T032255", "T039585", "74185", "T035762", "T036570", "2951", "T002207", "T000126", "T019704", "T038270", "T040402", "T008162" ] }, "release_date": "2024-07-01T22:00:00.000+00:00", "title": "CVE-2024-38477" }, { "cve": "CVE-2024-39573", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Apache HTTP Server. Diese Fehler bestehen in mehreren Komponenten wie dem Websocket, den Backreferences oder dem mod_rewrite Proxy-Handler, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einer NULL- Pointer-Dereferenz, einer serverseitigen Request Forgery oder einem Proxy-Codierungsproblem und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, die Authentifizierung zu umgehen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T038706", "T038747", "67646", "T034902", "T038746", "T038705", "T038745", "T039899", "T004914", "T039896", "T038286", "T001663", "398363", "342008", "T010509", "T034899", "T028053", "T034610", "T035727", "T003676", "T015632", "T034075", "T037028", "T012167", "T034074", "T039602", "T039586", "T032255", "T039585", "74185", "T035762", "T036570", "2951", "T002207", "T000126", "T019704", "T038270", "T040402", "T008162" ] }, "release_date": "2024-07-01T22:00:00.000+00:00", "title": "CVE-2024-39573" } ] }
ghsa-pf44-j75v-mhr8
Vulnerability from github
Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure.
Substitutions in server context that use a backreferences or variables as the first segment of the substitution are affected. Some unsafe RewiteRules will be broken by this change and the rewrite flag "UnsafePrefixStat" can be used to opt back in once ensuring the substitution is appropriately constrained.
{ "affected": [], "aliases": [ "CVE-2024-38475" ], "database_specific": { "cwe_ids": [ "CWE-116" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-07-01T19:15:04Z", "severity": "CRITICAL" }, "details": "Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are\u00a0permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. \n\nSubstitutions in\u00a0server context that use a backreferences or variables as the first segment of the substitution are affected.\u00a0 Some unsafe RewiteRules will be broken by this change and the rewrite flag \"UnsafePrefixStat\" can be used to opt back in once ensuring the substitution is appropriately constrained.", "id": "GHSA-pf44-j75v-mhr8", "modified": "2024-07-12T15:31:25Z", "published": "2024-07-01T21:31:14Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "type": "WEB", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20240712-0001" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "type": "CVSS_V3" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.