Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-65082 (GCVE-0-2025-65082)
Vulnerability from cvelistv5 – Published: 2025-12-05 10:46 – Updated: 2025-12-05 19:30- CWE-150 - Improper Neutralization of Escape, Meta, or Control Sequences
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Apache Software Foundation | Apache HTTP Server |
Affected:
2.4.0 , ≤ 2.4.65
(semver)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-12-05T11:06:01.853Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2025/12/04/7"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-65082",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-05T19:29:40.311810Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-12-05T19:30:08.216Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Apache HTTP Server",
"vendor": "Apache Software Foundation",
"versions": [
{
"lessThanOrEqual": "2.4.65",
"status": "affected",
"version": "2.4.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Mattias \u00c5sander (Ume\u00e5 University)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eImproper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.\u003c/p\u003e\u003cp\u003eThis issue affects Apache HTTP Server from 2.4.0 through 2.4.65.\u003c/p\u003e\u003cp\u003eUsers are recommended to upgrade to version 2.4.66 which fixes the issue.\u003c/p\u003e"
}
],
"value": "Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.\n\nThis issue affects Apache HTTP Server from 2.4.0 through 2.4.65.\n\nUsers are recommended to upgrade to version 2.4.66 which fixes the issue."
}
],
"metrics": [
{
"other": {
"content": {
"text": "low"
},
"type": "Textual description of severity"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-150",
"description": "CWE-150 Improper Neutralization of Escape, Meta, or Control Sequences",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-05T10:46:27.138Z",
"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"shortName": "apache"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"timeline": [
{
"lang": "en",
"time": "2025-11-14T12:00:00.000Z",
"value": "reported"
},
{
"lang": "en",
"time": "2025-12-01T12:00:00.000Z",
"value": "fixed in 2.4.x by r1930167"
}
],
"title": "Apache HTTP Server: CGI environment variable override",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"assignerShortName": "apache",
"cveId": "CVE-2025-65082",
"datePublished": "2025-12-05T10:46:27.138Z",
"dateReserved": "2025-11-17T14:06:38.215Z",
"dateUpdated": "2025-12-05T19:30:08.216Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-65082\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2025-12-05T11:15:52.497\",\"lastModified\":\"2025-12-10T16:39:56.450\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.\\n\\nThis issue affects Apache HTTP Server from 2.4.0 through 2.4.65.\\n\\nUsers are recommended to upgrade to version 2.4.66 which fixes the issue.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":2.5}]},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-150\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.4.0\",\"versionEndExcluding\":\"2.4.66\",\"matchCriteriaId\":\"2E190AC9-8786-444C-877C-DE4BC272331F\"}]}]}],\"references\":[{\"url\":\"https://httpd.apache.org/security/vulnerabilities_24.html\",\"source\":\"security@apache.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/12/04/7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2025/12/04/7\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-12-05T11:06:01.853Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-65082\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-12-05T19:29:40.311810Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-12-05T19:30:02.443Z\"}}], \"cna\": {\"title\": \"Apache HTTP Server: CGI environment variable override\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Mattias \\u00c5sander (Ume\\u00e5 University)\"}], \"metrics\": [{\"other\": {\"type\": \"Textual description of severity\", \"content\": {\"text\": \"low\"}}}], \"affected\": [{\"vendor\": \"Apache Software Foundation\", \"product\": \"Apache HTTP Server\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.4.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"2.4.65\"}], \"defaultStatus\": \"unaffected\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-11-14T12:00:00.000Z\", \"value\": \"reported\"}, {\"lang\": \"en\", \"time\": \"2025-12-01T12:00:00.000Z\", \"value\": \"fixed in 2.4.x by r1930167\"}], \"references\": [{\"url\": \"https://httpd.apache.org/security/vulnerabilities_24.html\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.\\n\\nThis issue affects Apache HTTP Server from 2.4.0 through 2.4.65.\\n\\nUsers are recommended to upgrade to version 2.4.66 which fixes the issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eImproper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.\u003c/p\u003e\u003cp\u003eThis issue affects Apache HTTP Server from 2.4.0 through 2.4.65.\u003c/p\u003e\u003cp\u003eUsers are recommended to upgrade to version 2.4.66 which fixes the issue.\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-150\", \"description\": \"CWE-150 Improper Neutralization of Escape, Meta, or Control Sequences\"}]}], \"providerMetadata\": {\"orgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"shortName\": \"apache\", \"dateUpdated\": \"2025-12-05T10:46:27.138Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-65082\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-12-05T19:30:08.216Z\", \"dateReserved\": \"2025-11-17T14:06:38.215Z\", \"assignerOrgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"datePublished\": \"2025-12-05T10:46:27.138Z\", \"assignerShortName\": \"apache\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
RHSA-2025:23932
Vulnerability from csaf_redhat - Published: 2025-12-22 16:55 - Updated: 2026-01-13 22:10Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for httpd is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Apache HTTP Server: CGI environment variable override (CVE-2025-65082)\n\n* httpd: Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo (CVE-2025-66200)\n\n* httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=... (CVE-2025-58098)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:23932",
"url": "https://access.redhat.com/errata/RHSA-2025:23932"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2419139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419139"
},
{
"category": "external",
"summary": "2419262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419262"
},
{
"category": "external",
"summary": "2419365",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419365"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_23932.json"
}
],
"title": "Red Hat Security Advisory: httpd security update",
"tracking": {
"current_release_date": "2026-01-13T22:10:06+00:00",
"generator": {
"date": "2026-01-13T22:10:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2025:23932",
"initial_release_date": "2025-12-22T16:55:54+00:00",
"revision_history": [
{
"date": "2025-12-22T16:55:54+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-12-22T16:55:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T22:10:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.63-4.el10_1.3.src",
"product": {
"name": "httpd-0:2.4.63-4.el10_1.3.src",
"product_id": "httpd-0:2.4.63-4.el10_1.3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.63-4.el10_1.3?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.63-4.el10_1.3.aarch64",
"product": {
"name": "httpd-0:2.4.63-4.el10_1.3.aarch64",
"product_id": "httpd-0:2.4.63-4.el10_1.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.63-4.el10_1.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "httpd-core-0:2.4.63-4.el10_1.3.aarch64",
"product": {
"name": "httpd-core-0:2.4.63-4.el10_1.3.aarch64",
"product_id": "httpd-core-0:2.4.63-4.el10_1.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-core@2.4.63-4.el10_1.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.63-4.el10_1.3.aarch64",
"product": {
"name": "httpd-devel-0:2.4.63-4.el10_1.3.aarch64",
"product_id": "httpd-devel-0:2.4.63-4.el10_1.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.63-4.el10_1.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.63-4.el10_1.3.aarch64",
"product": {
"name": "httpd-tools-0:2.4.63-4.el10_1.3.aarch64",
"product_id": "httpd-tools-0:2.4.63-4.el10_1.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.63-4.el10_1.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.63-4.el10_1.3.aarch64",
"product": {
"name": "mod_ldap-0:2.4.63-4.el10_1.3.aarch64",
"product_id": "mod_ldap-0:2.4.63-4.el10_1.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.63-4.el10_1.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_lua-0:2.4.63-4.el10_1.3.aarch64",
"product": {
"name": "mod_lua-0:2.4.63-4.el10_1.3.aarch64",
"product_id": "mod_lua-0:2.4.63-4.el10_1.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_lua@2.4.63-4.el10_1.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.63-4.el10_1.3.aarch64",
"product": {
"name": "mod_proxy_html-1:2.4.63-4.el10_1.3.aarch64",
"product_id": "mod_proxy_html-1:2.4.63-4.el10_1.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.63-4.el10_1.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.63-4.el10_1.3.aarch64",
"product": {
"name": "mod_session-0:2.4.63-4.el10_1.3.aarch64",
"product_id": "mod_session-0:2.4.63-4.el10_1.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.63-4.el10_1.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.63-4.el10_1.3.aarch64",
"product": {
"name": "mod_ssl-1:2.4.63-4.el10_1.3.aarch64",
"product_id": "mod_ssl-1:2.4.63-4.el10_1.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.63-4.el10_1.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-0:2.4.63-4.el10_1.3.aarch64",
"product": {
"name": "httpd-debugsource-0:2.4.63-4.el10_1.3.aarch64",
"product_id": "httpd-debugsource-0:2.4.63-4.el10_1.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.63-4.el10_1.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "httpd-core-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"product": {
"name": "httpd-core-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"product_id": "httpd-core-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.63-4.el10_1.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"product": {
"name": "httpd-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"product_id": "httpd-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.63-4.el10_1.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"product": {
"name": "httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"product_id": "httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.63-4.el10_1.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"product": {
"name": "mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"product_id": "mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.63-4.el10_1.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_lua-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"product": {
"name": "mod_lua-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"product_id": "mod_lua-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.63-4.el10_1.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"product": {
"name": "mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"product_id": "mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.63-4.el10_1.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"product": {
"name": "mod_session-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"product_id": "mod_session-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.63-4.el10_1.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"product": {
"name": "mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"product_id": "mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.63-4.el10_1.3?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.63-4.el10_1.3.ppc64le",
"product": {
"name": "httpd-0:2.4.63-4.el10_1.3.ppc64le",
"product_id": "httpd-0:2.4.63-4.el10_1.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.63-4.el10_1.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "httpd-core-0:2.4.63-4.el10_1.3.ppc64le",
"product": {
"name": "httpd-core-0:2.4.63-4.el10_1.3.ppc64le",
"product_id": "httpd-core-0:2.4.63-4.el10_1.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-core@2.4.63-4.el10_1.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.63-4.el10_1.3.ppc64le",
"product": {
"name": "httpd-devel-0:2.4.63-4.el10_1.3.ppc64le",
"product_id": "httpd-devel-0:2.4.63-4.el10_1.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.63-4.el10_1.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.63-4.el10_1.3.ppc64le",
"product": {
"name": "httpd-tools-0:2.4.63-4.el10_1.3.ppc64le",
"product_id": "httpd-tools-0:2.4.63-4.el10_1.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.63-4.el10_1.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.63-4.el10_1.3.ppc64le",
"product": {
"name": "mod_ldap-0:2.4.63-4.el10_1.3.ppc64le",
"product_id": "mod_ldap-0:2.4.63-4.el10_1.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.63-4.el10_1.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_lua-0:2.4.63-4.el10_1.3.ppc64le",
"product": {
"name": "mod_lua-0:2.4.63-4.el10_1.3.ppc64le",
"product_id": "mod_lua-0:2.4.63-4.el10_1.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_lua@2.4.63-4.el10_1.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.63-4.el10_1.3.ppc64le",
"product": {
"name": "mod_proxy_html-1:2.4.63-4.el10_1.3.ppc64le",
"product_id": "mod_proxy_html-1:2.4.63-4.el10_1.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.63-4.el10_1.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.63-4.el10_1.3.ppc64le",
"product": {
"name": "mod_session-0:2.4.63-4.el10_1.3.ppc64le",
"product_id": "mod_session-0:2.4.63-4.el10_1.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.63-4.el10_1.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.63-4.el10_1.3.ppc64le",
"product": {
"name": "mod_ssl-1:2.4.63-4.el10_1.3.ppc64le",
"product_id": "mod_ssl-1:2.4.63-4.el10_1.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.63-4.el10_1.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-0:2.4.63-4.el10_1.3.ppc64le",
"product": {
"name": "httpd-debugsource-0:2.4.63-4.el10_1.3.ppc64le",
"product_id": "httpd-debugsource-0:2.4.63-4.el10_1.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.63-4.el10_1.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "httpd-core-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"product": {
"name": "httpd-core-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"product_id": "httpd-core-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.63-4.el10_1.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"product": {
"name": "httpd-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"product_id": "httpd-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.63-4.el10_1.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"product": {
"name": "httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"product_id": "httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.63-4.el10_1.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"product": {
"name": "mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"product_id": "mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.63-4.el10_1.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_lua-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"product": {
"name": "mod_lua-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"product_id": "mod_lua-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.63-4.el10_1.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"product": {
"name": "mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"product_id": "mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.63-4.el10_1.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"product": {
"name": "mod_session-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"product_id": "mod_session-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.63-4.el10_1.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"product": {
"name": "mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"product_id": "mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.63-4.el10_1.3?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.63-4.el10_1.3.x86_64",
"product": {
"name": "httpd-0:2.4.63-4.el10_1.3.x86_64",
"product_id": "httpd-0:2.4.63-4.el10_1.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.63-4.el10_1.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-core-0:2.4.63-4.el10_1.3.x86_64",
"product": {
"name": "httpd-core-0:2.4.63-4.el10_1.3.x86_64",
"product_id": "httpd-core-0:2.4.63-4.el10_1.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-core@2.4.63-4.el10_1.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.63-4.el10_1.3.x86_64",
"product": {
"name": "httpd-devel-0:2.4.63-4.el10_1.3.x86_64",
"product_id": "httpd-devel-0:2.4.63-4.el10_1.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.63-4.el10_1.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.63-4.el10_1.3.x86_64",
"product": {
"name": "httpd-tools-0:2.4.63-4.el10_1.3.x86_64",
"product_id": "httpd-tools-0:2.4.63-4.el10_1.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.63-4.el10_1.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.63-4.el10_1.3.x86_64",
"product": {
"name": "mod_ldap-0:2.4.63-4.el10_1.3.x86_64",
"product_id": "mod_ldap-0:2.4.63-4.el10_1.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.63-4.el10_1.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_lua-0:2.4.63-4.el10_1.3.x86_64",
"product": {
"name": "mod_lua-0:2.4.63-4.el10_1.3.x86_64",
"product_id": "mod_lua-0:2.4.63-4.el10_1.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_lua@2.4.63-4.el10_1.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.63-4.el10_1.3.x86_64",
"product": {
"name": "mod_proxy_html-1:2.4.63-4.el10_1.3.x86_64",
"product_id": "mod_proxy_html-1:2.4.63-4.el10_1.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.63-4.el10_1.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.63-4.el10_1.3.x86_64",
"product": {
"name": "mod_session-0:2.4.63-4.el10_1.3.x86_64",
"product_id": "mod_session-0:2.4.63-4.el10_1.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.63-4.el10_1.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.63-4.el10_1.3.x86_64",
"product": {
"name": "mod_ssl-1:2.4.63-4.el10_1.3.x86_64",
"product_id": "mod_ssl-1:2.4.63-4.el10_1.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.63-4.el10_1.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-0:2.4.63-4.el10_1.3.x86_64",
"product": {
"name": "httpd-debugsource-0:2.4.63-4.el10_1.3.x86_64",
"product_id": "httpd-debugsource-0:2.4.63-4.el10_1.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.63-4.el10_1.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-core-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"product": {
"name": "httpd-core-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"product_id": "httpd-core-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.63-4.el10_1.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"product": {
"name": "httpd-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"product_id": "httpd-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.63-4.el10_1.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"product": {
"name": "httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"product_id": "httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.63-4.el10_1.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"product": {
"name": "mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"product_id": "mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.63-4.el10_1.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_lua-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"product": {
"name": "mod_lua-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"product_id": "mod_lua-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.63-4.el10_1.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.x86_64",
"product": {
"name": "mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.x86_64",
"product_id": "mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.63-4.el10_1.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"product": {
"name": "mod_session-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"product_id": "mod_session-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.63-4.el10_1.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.x86_64",
"product": {
"name": "mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.x86_64",
"product_id": "mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.63-4.el10_1.3?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.63-4.el10_1.3.s390x",
"product": {
"name": "httpd-0:2.4.63-4.el10_1.3.s390x",
"product_id": "httpd-0:2.4.63-4.el10_1.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.63-4.el10_1.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-core-0:2.4.63-4.el10_1.3.s390x",
"product": {
"name": "httpd-core-0:2.4.63-4.el10_1.3.s390x",
"product_id": "httpd-core-0:2.4.63-4.el10_1.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-core@2.4.63-4.el10_1.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.63-4.el10_1.3.s390x",
"product": {
"name": "httpd-devel-0:2.4.63-4.el10_1.3.s390x",
"product_id": "httpd-devel-0:2.4.63-4.el10_1.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.63-4.el10_1.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.63-4.el10_1.3.s390x",
"product": {
"name": "httpd-tools-0:2.4.63-4.el10_1.3.s390x",
"product_id": "httpd-tools-0:2.4.63-4.el10_1.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.63-4.el10_1.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.63-4.el10_1.3.s390x",
"product": {
"name": "mod_ldap-0:2.4.63-4.el10_1.3.s390x",
"product_id": "mod_ldap-0:2.4.63-4.el10_1.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.63-4.el10_1.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_lua-0:2.4.63-4.el10_1.3.s390x",
"product": {
"name": "mod_lua-0:2.4.63-4.el10_1.3.s390x",
"product_id": "mod_lua-0:2.4.63-4.el10_1.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_lua@2.4.63-4.el10_1.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.63-4.el10_1.3.s390x",
"product": {
"name": "mod_proxy_html-1:2.4.63-4.el10_1.3.s390x",
"product_id": "mod_proxy_html-1:2.4.63-4.el10_1.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.63-4.el10_1.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.63-4.el10_1.3.s390x",
"product": {
"name": "mod_session-0:2.4.63-4.el10_1.3.s390x",
"product_id": "mod_session-0:2.4.63-4.el10_1.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.63-4.el10_1.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.63-4.el10_1.3.s390x",
"product": {
"name": "mod_ssl-1:2.4.63-4.el10_1.3.s390x",
"product_id": "mod_ssl-1:2.4.63-4.el10_1.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.63-4.el10_1.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-0:2.4.63-4.el10_1.3.s390x",
"product": {
"name": "httpd-debugsource-0:2.4.63-4.el10_1.3.s390x",
"product_id": "httpd-debugsource-0:2.4.63-4.el10_1.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.63-4.el10_1.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-core-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"product": {
"name": "httpd-core-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"product_id": "httpd-core-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.63-4.el10_1.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"product": {
"name": "httpd-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"product_id": "httpd-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.63-4.el10_1.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"product": {
"name": "httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"product_id": "httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.63-4.el10_1.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"product": {
"name": "mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"product_id": "mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.63-4.el10_1.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_lua-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"product": {
"name": "mod_lua-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"product_id": "mod_lua-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.63-4.el10_1.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"product": {
"name": "mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"product_id": "mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.63-4.el10_1.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"product": {
"name": "mod_session-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"product_id": "mod_session-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.63-4.el10_1.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"product": {
"name": "mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"product_id": "mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.63-4.el10_1.3?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-filesystem-0:2.4.63-4.el10_1.3.noarch",
"product": {
"name": "httpd-filesystem-0:2.4.63-4.el10_1.3.noarch",
"product_id": "httpd-filesystem-0:2.4.63-4.el10_1.3.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-filesystem@2.4.63-4.el10_1.3?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.4.63-4.el10_1.3.noarch",
"product": {
"name": "httpd-manual-0:2.4.63-4.el10_1.3.noarch",
"product_id": "httpd-manual-0:2.4.63-4.el10_1.3.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.4.63-4.el10_1.3?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.63-4.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.aarch64"
},
"product_reference": "httpd-0:2.4.63-4.el10_1.3.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.63-4.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.ppc64le"
},
"product_reference": "httpd-0:2.4.63-4.el10_1.3.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.63-4.el10_1.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.s390x"
},
"product_reference": "httpd-0:2.4.63-4.el10_1.3.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.63-4.el10_1.3.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.src"
},
"product_reference": "httpd-0:2.4.63-4.el10_1.3.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.63-4.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.x86_64"
},
"product_reference": "httpd-0:2.4.63-4.el10_1.3.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-core-0:2.4.63-4.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.aarch64"
},
"product_reference": "httpd-core-0:2.4.63-4.el10_1.3.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-core-0:2.4.63-4.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.ppc64le"
},
"product_reference": "httpd-core-0:2.4.63-4.el10_1.3.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-core-0:2.4.63-4.el10_1.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.s390x"
},
"product_reference": "httpd-core-0:2.4.63-4.el10_1.3.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-core-0:2.4.63-4.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.x86_64"
},
"product_reference": "httpd-core-0:2.4.63-4.el10_1.3.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-core-debuginfo-0:2.4.63-4.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.aarch64"
},
"product_reference": "httpd-core-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-core-debuginfo-0:2.4.63-4.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.ppc64le"
},
"product_reference": "httpd-core-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-core-debuginfo-0:2.4.63-4.el10_1.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.s390x"
},
"product_reference": "httpd-core-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-core-debuginfo-0:2.4.63-4.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.x86_64"
},
"product_reference": "httpd-core-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.63-4.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.aarch64"
},
"product_reference": "httpd-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.63-4.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.ppc64le"
},
"product_reference": "httpd-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.63-4.el10_1.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.s390x"
},
"product_reference": "httpd-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.63-4.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-0:2.4.63-4.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.aarch64"
},
"product_reference": "httpd-debugsource-0:2.4.63-4.el10_1.3.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-0:2.4.63-4.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.ppc64le"
},
"product_reference": "httpd-debugsource-0:2.4.63-4.el10_1.3.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-0:2.4.63-4.el10_1.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.s390x"
},
"product_reference": "httpd-debugsource-0:2.4.63-4.el10_1.3.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-0:2.4.63-4.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.x86_64"
},
"product_reference": "httpd-debugsource-0:2.4.63-4.el10_1.3.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.63-4.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.aarch64"
},
"product_reference": "httpd-devel-0:2.4.63-4.el10_1.3.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.63-4.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.ppc64le"
},
"product_reference": "httpd-devel-0:2.4.63-4.el10_1.3.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.63-4.el10_1.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.s390x"
},
"product_reference": "httpd-devel-0:2.4.63-4.el10_1.3.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.63-4.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.x86_64"
},
"product_reference": "httpd-devel-0:2.4.63-4.el10_1.3.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-filesystem-0:2.4.63-4.el10_1.3.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-filesystem-0:2.4.63-4.el10_1.3.noarch"
},
"product_reference": "httpd-filesystem-0:2.4.63-4.el10_1.3.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.4.63-4.el10_1.3.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-manual-0:2.4.63-4.el10_1.3.noarch"
},
"product_reference": "httpd-manual-0:2.4.63-4.el10_1.3.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.63-4.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.aarch64"
},
"product_reference": "httpd-tools-0:2.4.63-4.el10_1.3.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.63-4.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.ppc64le"
},
"product_reference": "httpd-tools-0:2.4.63-4.el10_1.3.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.63-4.el10_1.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.s390x"
},
"product_reference": "httpd-tools-0:2.4.63-4.el10_1.3.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.63-4.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.x86_64"
},
"product_reference": "httpd-tools-0:2.4.63-4.el10_1.3.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.aarch64"
},
"product_reference": "httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.ppc64le"
},
"product_reference": "httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.s390x"
},
"product_reference": "httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.x86_64"
},
"product_reference": "httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.63-4.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.aarch64"
},
"product_reference": "mod_ldap-0:2.4.63-4.el10_1.3.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.63-4.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.ppc64le"
},
"product_reference": "mod_ldap-0:2.4.63-4.el10_1.3.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.63-4.el10_1.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.s390x"
},
"product_reference": "mod_ldap-0:2.4.63-4.el10_1.3.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.63-4.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.x86_64"
},
"product_reference": "mod_ldap-0:2.4.63-4.el10_1.3.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.aarch64"
},
"product_reference": "mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.ppc64le"
},
"product_reference": "mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.s390x"
},
"product_reference": "mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.x86_64"
},
"product_reference": "mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_lua-0:2.4.63-4.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.aarch64"
},
"product_reference": "mod_lua-0:2.4.63-4.el10_1.3.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_lua-0:2.4.63-4.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.ppc64le"
},
"product_reference": "mod_lua-0:2.4.63-4.el10_1.3.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_lua-0:2.4.63-4.el10_1.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.s390x"
},
"product_reference": "mod_lua-0:2.4.63-4.el10_1.3.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_lua-0:2.4.63-4.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.x86_64"
},
"product_reference": "mod_lua-0:2.4.63-4.el10_1.3.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_lua-debuginfo-0:2.4.63-4.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.aarch64"
},
"product_reference": "mod_lua-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_lua-debuginfo-0:2.4.63-4.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.ppc64le"
},
"product_reference": "mod_lua-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_lua-debuginfo-0:2.4.63-4.el10_1.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.s390x"
},
"product_reference": "mod_lua-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_lua-debuginfo-0:2.4.63-4.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.x86_64"
},
"product_reference": "mod_lua-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.63-4.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.aarch64"
},
"product_reference": "mod_proxy_html-1:2.4.63-4.el10_1.3.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.63-4.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.ppc64le"
},
"product_reference": "mod_proxy_html-1:2.4.63-4.el10_1.3.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.63-4.el10_1.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.s390x"
},
"product_reference": "mod_proxy_html-1:2.4.63-4.el10_1.3.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.63-4.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.x86_64"
},
"product_reference": "mod_proxy_html-1:2.4.63-4.el10_1.3.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.aarch64"
},
"product_reference": "mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.ppc64le"
},
"product_reference": "mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.s390x"
},
"product_reference": "mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.x86_64"
},
"product_reference": "mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.63-4.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.aarch64"
},
"product_reference": "mod_session-0:2.4.63-4.el10_1.3.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.63-4.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.ppc64le"
},
"product_reference": "mod_session-0:2.4.63-4.el10_1.3.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.63-4.el10_1.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.s390x"
},
"product_reference": "mod_session-0:2.4.63-4.el10_1.3.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.63-4.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.x86_64"
},
"product_reference": "mod_session-0:2.4.63-4.el10_1.3.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-0:2.4.63-4.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.aarch64"
},
"product_reference": "mod_session-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-0:2.4.63-4.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.ppc64le"
},
"product_reference": "mod_session-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-0:2.4.63-4.el10_1.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.s390x"
},
"product_reference": "mod_session-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-0:2.4.63-4.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.x86_64"
},
"product_reference": "mod_session-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.63-4.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.aarch64"
},
"product_reference": "mod_ssl-1:2.4.63-4.el10_1.3.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.63-4.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.ppc64le"
},
"product_reference": "mod_ssl-1:2.4.63-4.el10_1.3.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.63-4.el10_1.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.s390x"
},
"product_reference": "mod_ssl-1:2.4.63-4.el10_1.3.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.63-4.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.x86_64"
},
"product_reference": "mod_ssl-1:2.4.63-4.el10_1.3.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.aarch64"
},
"product_reference": "mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.ppc64le"
},
"product_reference": "mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.s390x"
},
"product_reference": "mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.x86_64"
},
"product_reference": "mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-58098",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"discovery_date": "2025-12-05T14:00:53.379125+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419365"
}
],
"notes": [
{
"category": "description",
"text": "Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd=\"...\" directives.\n\nThis issue affects Apache HTTP Server before 2.4.66.\n\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=...",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.src",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-filesystem-0:2.4.63-4.el10_1.3.noarch",
"AppStream-10.1.Z:httpd-manual-0:2.4.63-4.el10_1.3.noarch",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58098"
},
{
"category": "external",
"summary": "RHBZ#2419365",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419365"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58098"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58098",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58098"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2025-12-05T13:40:39.772000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-22T16:55:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.src",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-filesystem-0:2.4.63-4.el10_1.3.noarch",
"AppStream-10.1.Z:httpd-manual-0:2.4.63-4.el10_1.3.noarch",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23932"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.src",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-filesystem-0:2.4.63-4.el10_1.3.noarch",
"AppStream-10.1.Z:httpd-manual-0:2.4.63-4.el10_1.3.noarch",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.src",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-filesystem-0:2.4.63-4.el10_1.3.noarch",
"AppStream-10.1.Z:httpd-manual-0:2.4.63-4.el10_1.3.noarch",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=..."
},
{
"cve": "CVE-2025-65082",
"cwe": {
"id": "CWE-150",
"name": "Improper Neutralization of Escape, Meta, or Control Sequences"
},
"discovery_date": "2025-12-05T11:00:52.797985+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419139"
}
],
"notes": [
{
"category": "description",
"text": "Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.\n\nThis issue affects Apache HTTP Server from 2.4.0 through 2.4.65.\n\nUsers are recommended to upgrade to version 2.4.66 which fixes the issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Apache HTTP Server: CGI environment variable override",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.src",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-filesystem-0:2.4.63-4.el10_1.3.noarch",
"AppStream-10.1.Z:httpd-manual-0:2.4.63-4.el10_1.3.noarch",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-65082"
},
{
"category": "external",
"summary": "RHBZ#2419139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419139"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-65082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65082"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-65082",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-65082"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2025-12-05T10:46:27.138000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-22T16:55:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.src",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-filesystem-0:2.4.63-4.el10_1.3.noarch",
"AppStream-10.1.Z:httpd-manual-0:2.4.63-4.el10_1.3.noarch",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23932"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.src",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-filesystem-0:2.4.63-4.el10_1.3.noarch",
"AppStream-10.1.Z:httpd-manual-0:2.4.63-4.el10_1.3.noarch",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.src",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-filesystem-0:2.4.63-4.el10_1.3.noarch",
"AppStream-10.1.Z:httpd-manual-0:2.4.63-4.el10_1.3.noarch",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: Apache HTTP Server: CGI environment variable override"
},
{
"cve": "CVE-2025-66200",
"cwe": {
"id": "CWE-305",
"name": "Authentication Bypass by Primary Weakness"
},
"discovery_date": "2025-12-05T12:00:53.623799+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419262"
}
],
"notes": [
{
"category": "description",
"text": "mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid.\n\nThis issue affects Apache HTTP Server: from 2.4.7 through 2.4.65.\n\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.src",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-filesystem-0:2.4.63-4.el10_1.3.noarch",
"AppStream-10.1.Z:httpd-manual-0:2.4.63-4.el10_1.3.noarch",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66200"
},
{
"category": "external",
"summary": "RHBZ#2419262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419262"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66200"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66200",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66200"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/12/04/8",
"url": "http://www.openwall.com/lists/oss-security/2025/12/04/8"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2025-12-05T11:02:25.722000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-22T16:55:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.src",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-filesystem-0:2.4.63-4.el10_1.3.noarch",
"AppStream-10.1.Z:httpd-manual-0:2.4.63-4.el10_1.3.noarch",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23932"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.src",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-filesystem-0:2.4.63-4.el10_1.3.noarch",
"AppStream-10.1.Z:httpd-manual-0:2.4.63-4.el10_1.3.noarch",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.src",
"AppStream-10.1.Z:httpd-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-core-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-core-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-debugsource-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-devel-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-filesystem-0:2.4.63-4.el10_1.3.noarch",
"AppStream-10.1.Z:httpd-manual-0:2.4.63-4.el10_1.3.noarch",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-tools-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:httpd-tools-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ldap-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ldap-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_lua-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_lua-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_proxy_html-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_proxy_html-debuginfo-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_session-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_session-debuginfo-0:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ssl-1:2.4.63-4.el10_1.3.x86_64",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.aarch64",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.ppc64le",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.s390x",
"AppStream-10.1.Z:mod_ssl-debuginfo-1:2.4.63-4.el10_1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo"
}
]
}
RHSA-2025:23919
Vulnerability from csaf_redhat - Published: 2025-12-22 23:27 - Updated: 2026-01-13 22:14Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for httpd is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Apache HTTP Server: CGI environment variable override (CVE-2025-65082)\n\n* httpd: Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo (CVE-2025-66200)\n\n* httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=... (CVE-2025-58098)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:23919",
"url": "https://access.redhat.com/errata/RHSA-2025:23919"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2419139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419139"
},
{
"category": "external",
"summary": "2419262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419262"
},
{
"category": "external",
"summary": "2419365",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419365"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_23919.json"
}
],
"title": "Red Hat Security Advisory: httpd security update",
"tracking": {
"current_release_date": "2026-01-13T22:14:14+00:00",
"generator": {
"date": "2026-01-13T22:14:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2025:23919",
"initial_release_date": "2025-12-22T23:27:16+00:00",
"revision_history": [
{
"date": "2025-12-22T23:27:16+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-12-22T23:27:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T22:14:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.62-7.el9_7.3.src",
"product": {
"name": "httpd-0:2.4.62-7.el9_7.3.src",
"product_id": "httpd-0:2.4.62-7.el9_7.3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.62-7.el9_7.3?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.62-7.el9_7.3.aarch64",
"product": {
"name": "httpd-0:2.4.62-7.el9_7.3.aarch64",
"product_id": "httpd-0:2.4.62-7.el9_7.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.62-7.el9_7.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "httpd-core-0:2.4.62-7.el9_7.3.aarch64",
"product": {
"name": "httpd-core-0:2.4.62-7.el9_7.3.aarch64",
"product_id": "httpd-core-0:2.4.62-7.el9_7.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-core@2.4.62-7.el9_7.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.62-7.el9_7.3.aarch64",
"product": {
"name": "httpd-devel-0:2.4.62-7.el9_7.3.aarch64",
"product_id": "httpd-devel-0:2.4.62-7.el9_7.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.62-7.el9_7.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.62-7.el9_7.3.aarch64",
"product": {
"name": "httpd-tools-0:2.4.62-7.el9_7.3.aarch64",
"product_id": "httpd-tools-0:2.4.62-7.el9_7.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.62-7.el9_7.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.62-7.el9_7.3.aarch64",
"product": {
"name": "mod_ldap-0:2.4.62-7.el9_7.3.aarch64",
"product_id": "mod_ldap-0:2.4.62-7.el9_7.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.62-7.el9_7.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_lua-0:2.4.62-7.el9_7.3.aarch64",
"product": {
"name": "mod_lua-0:2.4.62-7.el9_7.3.aarch64",
"product_id": "mod_lua-0:2.4.62-7.el9_7.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_lua@2.4.62-7.el9_7.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.62-7.el9_7.3.aarch64",
"product": {
"name": "mod_proxy_html-1:2.4.62-7.el9_7.3.aarch64",
"product_id": "mod_proxy_html-1:2.4.62-7.el9_7.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.62-7.el9_7.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.62-7.el9_7.3.aarch64",
"product": {
"name": "mod_session-0:2.4.62-7.el9_7.3.aarch64",
"product_id": "mod_session-0:2.4.62-7.el9_7.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.62-7.el9_7.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.62-7.el9_7.3.aarch64",
"product": {
"name": "mod_ssl-1:2.4.62-7.el9_7.3.aarch64",
"product_id": "mod_ssl-1:2.4.62-7.el9_7.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.62-7.el9_7.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-0:2.4.62-7.el9_7.3.aarch64",
"product": {
"name": "httpd-debugsource-0:2.4.62-7.el9_7.3.aarch64",
"product_id": "httpd-debugsource-0:2.4.62-7.el9_7.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.62-7.el9_7.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "httpd-core-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"product": {
"name": "httpd-core-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"product_id": "httpd-core-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.62-7.el9_7.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"product": {
"name": "httpd-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"product_id": "httpd-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.62-7.el9_7.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"product": {
"name": "httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"product_id": "httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.62-7.el9_7.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"product": {
"name": "mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"product_id": "mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.62-7.el9_7.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_lua-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"product": {
"name": "mod_lua-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"product_id": "mod_lua-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.62-7.el9_7.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"product": {
"name": "mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"product_id": "mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.62-7.el9_7.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"product": {
"name": "mod_session-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"product_id": "mod_session-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.62-7.el9_7.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"product": {
"name": "mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"product_id": "mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.62-7.el9_7.3?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.62-7.el9_7.3.ppc64le",
"product": {
"name": "httpd-0:2.4.62-7.el9_7.3.ppc64le",
"product_id": "httpd-0:2.4.62-7.el9_7.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.62-7.el9_7.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "httpd-core-0:2.4.62-7.el9_7.3.ppc64le",
"product": {
"name": "httpd-core-0:2.4.62-7.el9_7.3.ppc64le",
"product_id": "httpd-core-0:2.4.62-7.el9_7.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-core@2.4.62-7.el9_7.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.62-7.el9_7.3.ppc64le",
"product": {
"name": "httpd-devel-0:2.4.62-7.el9_7.3.ppc64le",
"product_id": "httpd-devel-0:2.4.62-7.el9_7.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.62-7.el9_7.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.62-7.el9_7.3.ppc64le",
"product": {
"name": "httpd-tools-0:2.4.62-7.el9_7.3.ppc64le",
"product_id": "httpd-tools-0:2.4.62-7.el9_7.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.62-7.el9_7.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.62-7.el9_7.3.ppc64le",
"product": {
"name": "mod_ldap-0:2.4.62-7.el9_7.3.ppc64le",
"product_id": "mod_ldap-0:2.4.62-7.el9_7.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.62-7.el9_7.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_lua-0:2.4.62-7.el9_7.3.ppc64le",
"product": {
"name": "mod_lua-0:2.4.62-7.el9_7.3.ppc64le",
"product_id": "mod_lua-0:2.4.62-7.el9_7.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_lua@2.4.62-7.el9_7.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.62-7.el9_7.3.ppc64le",
"product": {
"name": "mod_proxy_html-1:2.4.62-7.el9_7.3.ppc64le",
"product_id": "mod_proxy_html-1:2.4.62-7.el9_7.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.62-7.el9_7.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.62-7.el9_7.3.ppc64le",
"product": {
"name": "mod_session-0:2.4.62-7.el9_7.3.ppc64le",
"product_id": "mod_session-0:2.4.62-7.el9_7.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.62-7.el9_7.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.62-7.el9_7.3.ppc64le",
"product": {
"name": "mod_ssl-1:2.4.62-7.el9_7.3.ppc64le",
"product_id": "mod_ssl-1:2.4.62-7.el9_7.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.62-7.el9_7.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-0:2.4.62-7.el9_7.3.ppc64le",
"product": {
"name": "httpd-debugsource-0:2.4.62-7.el9_7.3.ppc64le",
"product_id": "httpd-debugsource-0:2.4.62-7.el9_7.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.62-7.el9_7.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "httpd-core-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"product": {
"name": "httpd-core-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"product_id": "httpd-core-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.62-7.el9_7.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"product": {
"name": "httpd-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"product_id": "httpd-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.62-7.el9_7.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"product": {
"name": "httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"product_id": "httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.62-7.el9_7.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"product": {
"name": "mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"product_id": "mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.62-7.el9_7.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_lua-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"product": {
"name": "mod_lua-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"product_id": "mod_lua-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.62-7.el9_7.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"product": {
"name": "mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"product_id": "mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.62-7.el9_7.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"product": {
"name": "mod_session-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"product_id": "mod_session-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.62-7.el9_7.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"product": {
"name": "mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"product_id": "mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.62-7.el9_7.3?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.62-7.el9_7.3.x86_64",
"product": {
"name": "httpd-0:2.4.62-7.el9_7.3.x86_64",
"product_id": "httpd-0:2.4.62-7.el9_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.62-7.el9_7.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-core-0:2.4.62-7.el9_7.3.x86_64",
"product": {
"name": "httpd-core-0:2.4.62-7.el9_7.3.x86_64",
"product_id": "httpd-core-0:2.4.62-7.el9_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-core@2.4.62-7.el9_7.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.62-7.el9_7.3.x86_64",
"product": {
"name": "httpd-devel-0:2.4.62-7.el9_7.3.x86_64",
"product_id": "httpd-devel-0:2.4.62-7.el9_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.62-7.el9_7.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.62-7.el9_7.3.x86_64",
"product": {
"name": "httpd-tools-0:2.4.62-7.el9_7.3.x86_64",
"product_id": "httpd-tools-0:2.4.62-7.el9_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.62-7.el9_7.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.62-7.el9_7.3.x86_64",
"product": {
"name": "mod_ldap-0:2.4.62-7.el9_7.3.x86_64",
"product_id": "mod_ldap-0:2.4.62-7.el9_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.62-7.el9_7.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_lua-0:2.4.62-7.el9_7.3.x86_64",
"product": {
"name": "mod_lua-0:2.4.62-7.el9_7.3.x86_64",
"product_id": "mod_lua-0:2.4.62-7.el9_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_lua@2.4.62-7.el9_7.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.62-7.el9_7.3.x86_64",
"product": {
"name": "mod_proxy_html-1:2.4.62-7.el9_7.3.x86_64",
"product_id": "mod_proxy_html-1:2.4.62-7.el9_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.62-7.el9_7.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.62-7.el9_7.3.x86_64",
"product": {
"name": "mod_session-0:2.4.62-7.el9_7.3.x86_64",
"product_id": "mod_session-0:2.4.62-7.el9_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.62-7.el9_7.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.62-7.el9_7.3.x86_64",
"product": {
"name": "mod_ssl-1:2.4.62-7.el9_7.3.x86_64",
"product_id": "mod_ssl-1:2.4.62-7.el9_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.62-7.el9_7.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-0:2.4.62-7.el9_7.3.x86_64",
"product": {
"name": "httpd-debugsource-0:2.4.62-7.el9_7.3.x86_64",
"product_id": "httpd-debugsource-0:2.4.62-7.el9_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.62-7.el9_7.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-core-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"product": {
"name": "httpd-core-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"product_id": "httpd-core-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.62-7.el9_7.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"product": {
"name": "httpd-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"product_id": "httpd-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.62-7.el9_7.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"product": {
"name": "httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"product_id": "httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.62-7.el9_7.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"product": {
"name": "mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"product_id": "mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.62-7.el9_7.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_lua-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"product": {
"name": "mod_lua-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"product_id": "mod_lua-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.62-7.el9_7.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.x86_64",
"product": {
"name": "mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.x86_64",
"product_id": "mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.62-7.el9_7.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"product": {
"name": "mod_session-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"product_id": "mod_session-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.62-7.el9_7.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.x86_64",
"product": {
"name": "mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.x86_64",
"product_id": "mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.62-7.el9_7.3?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.62-7.el9_7.3.s390x",
"product": {
"name": "httpd-0:2.4.62-7.el9_7.3.s390x",
"product_id": "httpd-0:2.4.62-7.el9_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.62-7.el9_7.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-core-0:2.4.62-7.el9_7.3.s390x",
"product": {
"name": "httpd-core-0:2.4.62-7.el9_7.3.s390x",
"product_id": "httpd-core-0:2.4.62-7.el9_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-core@2.4.62-7.el9_7.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.62-7.el9_7.3.s390x",
"product": {
"name": "httpd-devel-0:2.4.62-7.el9_7.3.s390x",
"product_id": "httpd-devel-0:2.4.62-7.el9_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.62-7.el9_7.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.62-7.el9_7.3.s390x",
"product": {
"name": "httpd-tools-0:2.4.62-7.el9_7.3.s390x",
"product_id": "httpd-tools-0:2.4.62-7.el9_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.62-7.el9_7.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.62-7.el9_7.3.s390x",
"product": {
"name": "mod_ldap-0:2.4.62-7.el9_7.3.s390x",
"product_id": "mod_ldap-0:2.4.62-7.el9_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.62-7.el9_7.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_lua-0:2.4.62-7.el9_7.3.s390x",
"product": {
"name": "mod_lua-0:2.4.62-7.el9_7.3.s390x",
"product_id": "mod_lua-0:2.4.62-7.el9_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_lua@2.4.62-7.el9_7.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.62-7.el9_7.3.s390x",
"product": {
"name": "mod_proxy_html-1:2.4.62-7.el9_7.3.s390x",
"product_id": "mod_proxy_html-1:2.4.62-7.el9_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.62-7.el9_7.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.62-7.el9_7.3.s390x",
"product": {
"name": "mod_session-0:2.4.62-7.el9_7.3.s390x",
"product_id": "mod_session-0:2.4.62-7.el9_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.62-7.el9_7.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.62-7.el9_7.3.s390x",
"product": {
"name": "mod_ssl-1:2.4.62-7.el9_7.3.s390x",
"product_id": "mod_ssl-1:2.4.62-7.el9_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.62-7.el9_7.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-0:2.4.62-7.el9_7.3.s390x",
"product": {
"name": "httpd-debugsource-0:2.4.62-7.el9_7.3.s390x",
"product_id": "httpd-debugsource-0:2.4.62-7.el9_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.62-7.el9_7.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-core-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"product": {
"name": "httpd-core-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"product_id": "httpd-core-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.62-7.el9_7.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"product": {
"name": "httpd-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"product_id": "httpd-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.62-7.el9_7.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"product": {
"name": "httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"product_id": "httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.62-7.el9_7.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"product": {
"name": "mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"product_id": "mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.62-7.el9_7.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_lua-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"product": {
"name": "mod_lua-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"product_id": "mod_lua-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.62-7.el9_7.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"product": {
"name": "mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"product_id": "mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.62-7.el9_7.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"product": {
"name": "mod_session-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"product_id": "mod_session-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.62-7.el9_7.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"product": {
"name": "mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"product_id": "mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.62-7.el9_7.3?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-filesystem-0:2.4.62-7.el9_7.3.noarch",
"product": {
"name": "httpd-filesystem-0:2.4.62-7.el9_7.3.noarch",
"product_id": "httpd-filesystem-0:2.4.62-7.el9_7.3.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-filesystem@2.4.62-7.el9_7.3?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.4.62-7.el9_7.3.noarch",
"product": {
"name": "httpd-manual-0:2.4.62-7.el9_7.3.noarch",
"product_id": "httpd-manual-0:2.4.62-7.el9_7.3.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.4.62-7.el9_7.3?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.62-7.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.aarch64"
},
"product_reference": "httpd-0:2.4.62-7.el9_7.3.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.62-7.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.ppc64le"
},
"product_reference": "httpd-0:2.4.62-7.el9_7.3.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.62-7.el9_7.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.s390x"
},
"product_reference": "httpd-0:2.4.62-7.el9_7.3.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.62-7.el9_7.3.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.src"
},
"product_reference": "httpd-0:2.4.62-7.el9_7.3.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.62-7.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.x86_64"
},
"product_reference": "httpd-0:2.4.62-7.el9_7.3.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-core-0:2.4.62-7.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.aarch64"
},
"product_reference": "httpd-core-0:2.4.62-7.el9_7.3.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-core-0:2.4.62-7.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.ppc64le"
},
"product_reference": "httpd-core-0:2.4.62-7.el9_7.3.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-core-0:2.4.62-7.el9_7.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.s390x"
},
"product_reference": "httpd-core-0:2.4.62-7.el9_7.3.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-core-0:2.4.62-7.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.x86_64"
},
"product_reference": "httpd-core-0:2.4.62-7.el9_7.3.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-core-debuginfo-0:2.4.62-7.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.aarch64"
},
"product_reference": "httpd-core-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-core-debuginfo-0:2.4.62-7.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.ppc64le"
},
"product_reference": "httpd-core-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-core-debuginfo-0:2.4.62-7.el9_7.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.s390x"
},
"product_reference": "httpd-core-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-core-debuginfo-0:2.4.62-7.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.x86_64"
},
"product_reference": "httpd-core-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.62-7.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.aarch64"
},
"product_reference": "httpd-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.62-7.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.ppc64le"
},
"product_reference": "httpd-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.62-7.el9_7.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.s390x"
},
"product_reference": "httpd-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.62-7.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-0:2.4.62-7.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.aarch64"
},
"product_reference": "httpd-debugsource-0:2.4.62-7.el9_7.3.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-0:2.4.62-7.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.ppc64le"
},
"product_reference": "httpd-debugsource-0:2.4.62-7.el9_7.3.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-0:2.4.62-7.el9_7.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.s390x"
},
"product_reference": "httpd-debugsource-0:2.4.62-7.el9_7.3.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-0:2.4.62-7.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.x86_64"
},
"product_reference": "httpd-debugsource-0:2.4.62-7.el9_7.3.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.62-7.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.aarch64"
},
"product_reference": "httpd-devel-0:2.4.62-7.el9_7.3.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.62-7.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.ppc64le"
},
"product_reference": "httpd-devel-0:2.4.62-7.el9_7.3.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.62-7.el9_7.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.s390x"
},
"product_reference": "httpd-devel-0:2.4.62-7.el9_7.3.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.62-7.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.x86_64"
},
"product_reference": "httpd-devel-0:2.4.62-7.el9_7.3.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-filesystem-0:2.4.62-7.el9_7.3.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-filesystem-0:2.4.62-7.el9_7.3.noarch"
},
"product_reference": "httpd-filesystem-0:2.4.62-7.el9_7.3.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.4.62-7.el9_7.3.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-manual-0:2.4.62-7.el9_7.3.noarch"
},
"product_reference": "httpd-manual-0:2.4.62-7.el9_7.3.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.62-7.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.aarch64"
},
"product_reference": "httpd-tools-0:2.4.62-7.el9_7.3.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.62-7.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.ppc64le"
},
"product_reference": "httpd-tools-0:2.4.62-7.el9_7.3.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.62-7.el9_7.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.s390x"
},
"product_reference": "httpd-tools-0:2.4.62-7.el9_7.3.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.62-7.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.x86_64"
},
"product_reference": "httpd-tools-0:2.4.62-7.el9_7.3.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.aarch64"
},
"product_reference": "httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.ppc64le"
},
"product_reference": "httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.s390x"
},
"product_reference": "httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.x86_64"
},
"product_reference": "httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.62-7.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.aarch64"
},
"product_reference": "mod_ldap-0:2.4.62-7.el9_7.3.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.62-7.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.ppc64le"
},
"product_reference": "mod_ldap-0:2.4.62-7.el9_7.3.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.62-7.el9_7.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.s390x"
},
"product_reference": "mod_ldap-0:2.4.62-7.el9_7.3.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.62-7.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.x86_64"
},
"product_reference": "mod_ldap-0:2.4.62-7.el9_7.3.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.aarch64"
},
"product_reference": "mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.ppc64le"
},
"product_reference": "mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.s390x"
},
"product_reference": "mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.x86_64"
},
"product_reference": "mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_lua-0:2.4.62-7.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.aarch64"
},
"product_reference": "mod_lua-0:2.4.62-7.el9_7.3.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_lua-0:2.4.62-7.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.ppc64le"
},
"product_reference": "mod_lua-0:2.4.62-7.el9_7.3.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_lua-0:2.4.62-7.el9_7.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.s390x"
},
"product_reference": "mod_lua-0:2.4.62-7.el9_7.3.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_lua-0:2.4.62-7.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.x86_64"
},
"product_reference": "mod_lua-0:2.4.62-7.el9_7.3.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_lua-debuginfo-0:2.4.62-7.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.aarch64"
},
"product_reference": "mod_lua-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_lua-debuginfo-0:2.4.62-7.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.ppc64le"
},
"product_reference": "mod_lua-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_lua-debuginfo-0:2.4.62-7.el9_7.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.s390x"
},
"product_reference": "mod_lua-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_lua-debuginfo-0:2.4.62-7.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.x86_64"
},
"product_reference": "mod_lua-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.62-7.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.aarch64"
},
"product_reference": "mod_proxy_html-1:2.4.62-7.el9_7.3.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.62-7.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.ppc64le"
},
"product_reference": "mod_proxy_html-1:2.4.62-7.el9_7.3.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.62-7.el9_7.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.s390x"
},
"product_reference": "mod_proxy_html-1:2.4.62-7.el9_7.3.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.62-7.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.x86_64"
},
"product_reference": "mod_proxy_html-1:2.4.62-7.el9_7.3.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.aarch64"
},
"product_reference": "mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.ppc64le"
},
"product_reference": "mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.s390x"
},
"product_reference": "mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.x86_64"
},
"product_reference": "mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.62-7.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.aarch64"
},
"product_reference": "mod_session-0:2.4.62-7.el9_7.3.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.62-7.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.ppc64le"
},
"product_reference": "mod_session-0:2.4.62-7.el9_7.3.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.62-7.el9_7.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.s390x"
},
"product_reference": "mod_session-0:2.4.62-7.el9_7.3.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.62-7.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.x86_64"
},
"product_reference": "mod_session-0:2.4.62-7.el9_7.3.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-0:2.4.62-7.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.aarch64"
},
"product_reference": "mod_session-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-0:2.4.62-7.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.ppc64le"
},
"product_reference": "mod_session-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-0:2.4.62-7.el9_7.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.s390x"
},
"product_reference": "mod_session-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-0:2.4.62-7.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.x86_64"
},
"product_reference": "mod_session-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.62-7.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.aarch64"
},
"product_reference": "mod_ssl-1:2.4.62-7.el9_7.3.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.62-7.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.ppc64le"
},
"product_reference": "mod_ssl-1:2.4.62-7.el9_7.3.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.62-7.el9_7.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.s390x"
},
"product_reference": "mod_ssl-1:2.4.62-7.el9_7.3.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.62-7.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.x86_64"
},
"product_reference": "mod_ssl-1:2.4.62-7.el9_7.3.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.aarch64"
},
"product_reference": "mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.ppc64le"
},
"product_reference": "mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.s390x"
},
"product_reference": "mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.x86_64"
},
"product_reference": "mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-58098",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"discovery_date": "2025-12-05T14:00:53.379125+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419365"
}
],
"notes": [
{
"category": "description",
"text": "Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd=\"...\" directives.\n\nThis issue affects Apache HTTP Server before 2.4.66.\n\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=...",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.src",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-filesystem-0:2.4.62-7.el9_7.3.noarch",
"AppStream-9.7.0.Z.MAIN:httpd-manual-0:2.4.62-7.el9_7.3.noarch",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58098"
},
{
"category": "external",
"summary": "RHBZ#2419365",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419365"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58098"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58098",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58098"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2025-12-05T13:40:39.772000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-22T23:27:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.src",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-filesystem-0:2.4.62-7.el9_7.3.noarch",
"AppStream-9.7.0.Z.MAIN:httpd-manual-0:2.4.62-7.el9_7.3.noarch",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23919"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.src",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-filesystem-0:2.4.62-7.el9_7.3.noarch",
"AppStream-9.7.0.Z.MAIN:httpd-manual-0:2.4.62-7.el9_7.3.noarch",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.src",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-filesystem-0:2.4.62-7.el9_7.3.noarch",
"AppStream-9.7.0.Z.MAIN:httpd-manual-0:2.4.62-7.el9_7.3.noarch",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=..."
},
{
"cve": "CVE-2025-65082",
"cwe": {
"id": "CWE-150",
"name": "Improper Neutralization of Escape, Meta, or Control Sequences"
},
"discovery_date": "2025-12-05T11:00:52.797985+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419139"
}
],
"notes": [
{
"category": "description",
"text": "Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.\n\nThis issue affects Apache HTTP Server from 2.4.0 through 2.4.65.\n\nUsers are recommended to upgrade to version 2.4.66 which fixes the issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Apache HTTP Server: CGI environment variable override",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.src",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-filesystem-0:2.4.62-7.el9_7.3.noarch",
"AppStream-9.7.0.Z.MAIN:httpd-manual-0:2.4.62-7.el9_7.3.noarch",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-65082"
},
{
"category": "external",
"summary": "RHBZ#2419139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419139"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-65082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65082"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-65082",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-65082"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2025-12-05T10:46:27.138000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-22T23:27:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.src",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-filesystem-0:2.4.62-7.el9_7.3.noarch",
"AppStream-9.7.0.Z.MAIN:httpd-manual-0:2.4.62-7.el9_7.3.noarch",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23919"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.src",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-filesystem-0:2.4.62-7.el9_7.3.noarch",
"AppStream-9.7.0.Z.MAIN:httpd-manual-0:2.4.62-7.el9_7.3.noarch",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.src",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-filesystem-0:2.4.62-7.el9_7.3.noarch",
"AppStream-9.7.0.Z.MAIN:httpd-manual-0:2.4.62-7.el9_7.3.noarch",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: Apache HTTP Server: CGI environment variable override"
},
{
"cve": "CVE-2025-66200",
"cwe": {
"id": "CWE-305",
"name": "Authentication Bypass by Primary Weakness"
},
"discovery_date": "2025-12-05T12:00:53.623799+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419262"
}
],
"notes": [
{
"category": "description",
"text": "mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid.\n\nThis issue affects Apache HTTP Server: from 2.4.7 through 2.4.65.\n\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.src",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-filesystem-0:2.4.62-7.el9_7.3.noarch",
"AppStream-9.7.0.Z.MAIN:httpd-manual-0:2.4.62-7.el9_7.3.noarch",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66200"
},
{
"category": "external",
"summary": "RHBZ#2419262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419262"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66200"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66200",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66200"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/12/04/8",
"url": "http://www.openwall.com/lists/oss-security/2025/12/04/8"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2025-12-05T11:02:25.722000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-22T23:27:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.src",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-filesystem-0:2.4.62-7.el9_7.3.noarch",
"AppStream-9.7.0.Z.MAIN:httpd-manual-0:2.4.62-7.el9_7.3.noarch",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23919"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.src",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-filesystem-0:2.4.62-7.el9_7.3.noarch",
"AppStream-9.7.0.Z.MAIN:httpd-manual-0:2.4.62-7.el9_7.3.noarch",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.src",
"AppStream-9.7.0.Z.MAIN:httpd-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-core-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-core-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-debugsource-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-devel-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-filesystem-0:2.4.62-7.el9_7.3.noarch",
"AppStream-9.7.0.Z.MAIN:httpd-manual-0:2.4.62-7.el9_7.3.noarch",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-tools-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:httpd-tools-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ldap-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ldap-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_lua-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_lua-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_proxy_html-debuginfo-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_session-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_session-debuginfo-0:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ssl-1:2.4.62-7.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:mod_ssl-debuginfo-1:2.4.62-7.el9_7.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo"
}
]
}
RHSA-2025:23732
Vulnerability from csaf_redhat - Published: 2025-12-22 01:33 - Updated: 2026-01-13 22:14Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Apache HTTP Server: CGI environment variable override (CVE-2025-65082)\n\n* mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals (CVE-2025-55753)\n\n* httpd: Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo (CVE-2025-66200)\n\n* httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=... (CVE-2025-58098)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:23732",
"url": "https://access.redhat.com/errata/RHSA-2025:23732"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2419139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419139"
},
{
"category": "external",
"summary": "2419140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419140"
},
{
"category": "external",
"summary": "2419262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419262"
},
{
"category": "external",
"summary": "2419365",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419365"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_23732.json"
}
],
"title": "Red Hat Security Advisory: httpd:2.4 security update",
"tracking": {
"current_release_date": "2026-01-13T22:14:45+00:00",
"generator": {
"date": "2026-01-13T22:14:45+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2025:23732",
"initial_release_date": "2025-12-22T01:33:02+00:00",
"revision_history": [
{
"date": "2025-12-22T01:33:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-12-22T01:33:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T22:14:45+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.src::httpd:2.4",
"product": {
"name": "httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.src (httpd:2.4)",
"product_id": "httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.src::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=src\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.src::httpd:2.4",
"product": {
"name": "mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.src (httpd:2.4)",
"product_id": "mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.src::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2@1.15.7-10.module%2Bel8.10.0%2B23369%2B11a81384.4?arch=src\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.src::httpd:2.4",
"product": {
"name": "mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.src (httpd:2.4)",
"product_id": "mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.src::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.10.0%2B23815%2B1b5e1c66.2?arch=src\u0026epoch=1\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-filesystem-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"product": {
"name": "httpd-filesystem-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch (httpd:2.4)",
"product_id": "httpd-filesystem-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=noarch\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"product": {
"name": "httpd-manual-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch (httpd:2.4)",
"product_id": "httpd-manual-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=noarch\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"product": {
"name": "httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64 (httpd:2.4)",
"product_id": "httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=aarch64\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"product": {
"name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64 (httpd:2.4)",
"product_id": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=aarch64\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"product": {
"name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64 (httpd:2.4)",
"product_id": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=aarch64\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"product": {
"name": "httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64 (httpd:2.4)",
"product_id": "httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=aarch64\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"product": {
"name": "httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64 (httpd:2.4)",
"product_id": "httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=aarch64\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"product": {
"name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64 (httpd:2.4)",
"product_id": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=aarch64\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"product": {
"name": "mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64 (httpd:2.4)",
"product_id": "mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2@1.15.7-10.module%2Bel8.10.0%2B23369%2B11a81384.4?arch=aarch64\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"product": {
"name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64 (httpd:2.4)",
"product_id": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-10.module%2Bel8.10.0%2B23369%2B11a81384.4?arch=aarch64\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"product": {
"name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64 (httpd:2.4)",
"product_id": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-10.module%2Bel8.10.0%2B23369%2B11a81384.4?arch=aarch64\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"product": {
"name": "mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64 (httpd:2.4)",
"product_id": "mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=aarch64\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"product": {
"name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64 (httpd:2.4)",
"product_id": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=aarch64\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"product": {
"name": "mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64 (httpd:2.4)",
"product_id": "mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.10.0%2B23815%2B1b5e1c66.2?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"product": {
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64 (httpd:2.4)",
"product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.10.0%2B23815%2B1b5e1c66.2?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"product": {
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64 (httpd:2.4)",
"product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.10.0%2B23815%2B1b5e1c66.2?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"product": {
"name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64 (httpd:2.4)",
"product_id": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"product": {
"name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64 (httpd:2.4)",
"product_id": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"product": {
"name": "mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64 (httpd:2.4)",
"product_id": "mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=aarch64\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"product": {
"name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64 (httpd:2.4)",
"product_id": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=aarch64\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"product": {
"name": "mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64 (httpd:2.4)",
"product_id": "mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"product": {
"name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64 (httpd:2.4)",
"product_id": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"product": {
"name": "httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le (httpd:2.4)",
"product_id": "httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=ppc64le\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"product": {
"name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le (httpd:2.4)",
"product_id": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=ppc64le\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"product": {
"name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le (httpd:2.4)",
"product_id": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=ppc64le\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"product": {
"name": "httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le (httpd:2.4)",
"product_id": "httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=ppc64le\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"product": {
"name": "httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le (httpd:2.4)",
"product_id": "httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=ppc64le\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"product": {
"name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le (httpd:2.4)",
"product_id": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=ppc64le\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"product": {
"name": "mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le (httpd:2.4)",
"product_id": "mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2@1.15.7-10.module%2Bel8.10.0%2B23369%2B11a81384.4?arch=ppc64le\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"product": {
"name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le (httpd:2.4)",
"product_id": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-10.module%2Bel8.10.0%2B23369%2B11a81384.4?arch=ppc64le\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"product": {
"name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le (httpd:2.4)",
"product_id": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-10.module%2Bel8.10.0%2B23369%2B11a81384.4?arch=ppc64le\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"product": {
"name": "mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le (httpd:2.4)",
"product_id": "mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=ppc64le\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"product": {
"name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le (httpd:2.4)",
"product_id": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=ppc64le\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"product": {
"name": "mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le (httpd:2.4)",
"product_id": "mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.10.0%2B23815%2B1b5e1c66.2?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"product": {
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le (httpd:2.4)",
"product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.10.0%2B23815%2B1b5e1c66.2?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"product": {
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le (httpd:2.4)",
"product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.10.0%2B23815%2B1b5e1c66.2?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"product": {
"name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le (httpd:2.4)",
"product_id": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"product": {
"name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le (httpd:2.4)",
"product_id": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"product": {
"name": "mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le (httpd:2.4)",
"product_id": "mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=ppc64le\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"product": {
"name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le (httpd:2.4)",
"product_id": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=ppc64le\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"product": {
"name": "mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le (httpd:2.4)",
"product_id": "mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"product": {
"name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le (httpd:2.4)",
"product_id": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"product": {
"name": "httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x (httpd:2.4)",
"product_id": "httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=s390x\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"product": {
"name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x (httpd:2.4)",
"product_id": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=s390x\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"product": {
"name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x (httpd:2.4)",
"product_id": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=s390x\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"product": {
"name": "httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x (httpd:2.4)",
"product_id": "httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=s390x\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"product": {
"name": "httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x (httpd:2.4)",
"product_id": "httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=s390x\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"product": {
"name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x (httpd:2.4)",
"product_id": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=s390x\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"product": {
"name": "mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x (httpd:2.4)",
"product_id": "mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2@1.15.7-10.module%2Bel8.10.0%2B23369%2B11a81384.4?arch=s390x\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"product": {
"name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x (httpd:2.4)",
"product_id": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-10.module%2Bel8.10.0%2B23369%2B11a81384.4?arch=s390x\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"product": {
"name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x (httpd:2.4)",
"product_id": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-10.module%2Bel8.10.0%2B23369%2B11a81384.4?arch=s390x\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"product": {
"name": "mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x (httpd:2.4)",
"product_id": "mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=s390x\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"product": {
"name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x (httpd:2.4)",
"product_id": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=s390x\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"product": {
"name": "mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x (httpd:2.4)",
"product_id": "mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.10.0%2B23815%2B1b5e1c66.2?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"product": {
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x (httpd:2.4)",
"product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.10.0%2B23815%2B1b5e1c66.2?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"product": {
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x (httpd:2.4)",
"product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.10.0%2B23815%2B1b5e1c66.2?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"product": {
"name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x (httpd:2.4)",
"product_id": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"product": {
"name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x (httpd:2.4)",
"product_id": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"product": {
"name": "mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x (httpd:2.4)",
"product_id": "mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=s390x\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"product": {
"name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x (httpd:2.4)",
"product_id": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=s390x\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"product": {
"name": "mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x (httpd:2.4)",
"product_id": "mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"product": {
"name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x (httpd:2.4)",
"product_id": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"product": {
"name": "httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64 (httpd:2.4)",
"product_id": "httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=x86_64\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"product": {
"name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64 (httpd:2.4)",
"product_id": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=x86_64\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"product": {
"name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64 (httpd:2.4)",
"product_id": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=x86_64\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"product": {
"name": "httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64 (httpd:2.4)",
"product_id": "httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=x86_64\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"product": {
"name": "httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64 (httpd:2.4)",
"product_id": "httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=x86_64\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"product": {
"name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64 (httpd:2.4)",
"product_id": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=x86_64\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"product": {
"name": "mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64 (httpd:2.4)",
"product_id": "mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2@1.15.7-10.module%2Bel8.10.0%2B23369%2B11a81384.4?arch=x86_64\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"product": {
"name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64 (httpd:2.4)",
"product_id": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-10.module%2Bel8.10.0%2B23369%2B11a81384.4?arch=x86_64\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"product": {
"name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64 (httpd:2.4)",
"product_id": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-10.module%2Bel8.10.0%2B23369%2B11a81384.4?arch=x86_64\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"product": {
"name": "mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64 (httpd:2.4)",
"product_id": "mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=x86_64\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"product": {
"name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64 (httpd:2.4)",
"product_id": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=x86_64\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"product": {
"name": "mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64 (httpd:2.4)",
"product_id": "mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.10.0%2B23815%2B1b5e1c66.2?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"product": {
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64 (httpd:2.4)",
"product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.10.0%2B23815%2B1b5e1c66.2?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"product": {
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64 (httpd:2.4)",
"product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.10.0%2B23815%2B1b5e1c66.2?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"product": {
"name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64 (httpd:2.4)",
"product_id": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"product": {
"name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64 (httpd:2.4)",
"product_id": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"product": {
"name": "mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64 (httpd:2.4)",
"product_id": "mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=x86_64\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"product": {
"name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64 (httpd:2.4)",
"product_id": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=x86_64\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"product": {
"name": "mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64 (httpd:2.4)",
"product_id": "mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"product": {
"name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64 (httpd:2.4)",
"product_id": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-65.module%2Bel8.10.0%2B23815%2B1b5e1c66.7?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8100020251212173309:489197e6"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4"
},
"product_reference": "httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4"
},
"product_reference": "httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4"
},
"product_reference": "httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.src (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.src::httpd:2.4"
},
"product_reference": "httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.src::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4"
},
"product_reference": "httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4"
},
"product_reference": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4"
},
"product_reference": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4"
},
"product_reference": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4"
},
"product_reference": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4"
},
"product_reference": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4"
},
"product_reference": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4"
},
"product_reference": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4"
},
"product_reference": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4"
},
"product_reference": "httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4"
},
"product_reference": "httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4"
},
"product_reference": "httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4"
},
"product_reference": "httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-filesystem-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4"
},
"product_reference": "httpd-filesystem-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd-manual-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4"
},
"product_reference": "httpd-manual-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4"
},
"product_reference": "httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4"
},
"product_reference": "httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4"
},
"product_reference": "httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4"
},
"product_reference": "httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4"
},
"product_reference": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4"
},
"product_reference": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4"
},
"product_reference": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4"
},
"product_reference": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4"
},
"product_reference": "mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4"
},
"product_reference": "mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4"
},
"product_reference": "mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.src (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.src::httpd:2.4"
},
"product_reference": "mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.src::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4"
},
"product_reference": "mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4"
},
"product_reference": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4"
},
"product_reference": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4"
},
"product_reference": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4"
},
"product_reference": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4"
},
"product_reference": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4"
},
"product_reference": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4"
},
"product_reference": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4"
},
"product_reference": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4"
},
"product_reference": "mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4"
},
"product_reference": "mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4"
},
"product_reference": "mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4"
},
"product_reference": "mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4"
},
"product_reference": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4"
},
"product_reference": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4"
},
"product_reference": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4"
},
"product_reference": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4"
},
"product_reference": "mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4"
},
"product_reference": "mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4"
},
"product_reference": "mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.src (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.src::httpd:2.4"
},
"product_reference": "mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.src::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4"
},
"product_reference": "mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4"
},
"product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4"
},
"product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4"
},
"product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4"
},
"product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4"
},
"product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4"
},
"product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4"
},
"product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4"
},
"product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4"
},
"product_reference": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4"
},
"product_reference": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4"
},
"product_reference": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4"
},
"product_reference": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4"
},
"product_reference": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4"
},
"product_reference": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4"
},
"product_reference": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4"
},
"product_reference": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4"
},
"product_reference": "mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4"
},
"product_reference": "mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4"
},
"product_reference": "mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4"
},
"product_reference": "mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4"
},
"product_reference": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4"
},
"product_reference": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4"
},
"product_reference": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4"
},
"product_reference": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4"
},
"product_reference": "mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4"
},
"product_reference": "mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4"
},
"product_reference": "mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4"
},
"product_reference": "mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4"
},
"product_reference": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4"
},
"product_reference": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4"
},
"product_reference": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4"
},
"product_reference": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55753",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-12-05T11:00:56.469663+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419140"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.\n\nThis issue affects Apache HTTP Server: from 2.4.30 before 2.4.66.\n\n\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-manual-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-55753"
},
{
"category": "external",
"summary": "RHBZ#2419140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419140"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-55753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-55753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55753"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2025-12-05T10:12:22.041000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-22T01:33:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-manual-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23732"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-manual-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-manual-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals"
},
{
"cve": "CVE-2025-58098",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"discovery_date": "2025-12-05T14:00:53.379125+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419365"
}
],
"notes": [
{
"category": "description",
"text": "Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd=\"...\" directives.\n\nThis issue affects Apache HTTP Server before 2.4.66.\n\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=...",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-manual-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58098"
},
{
"category": "external",
"summary": "RHBZ#2419365",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419365"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58098"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58098",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58098"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2025-12-05T13:40:39.772000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-22T01:33:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-manual-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23732"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-manual-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-manual-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=..."
},
{
"cve": "CVE-2025-65082",
"cwe": {
"id": "CWE-150",
"name": "Improper Neutralization of Escape, Meta, or Control Sequences"
},
"discovery_date": "2025-12-05T11:00:52.797985+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419139"
}
],
"notes": [
{
"category": "description",
"text": "Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.\n\nThis issue affects Apache HTTP Server from 2.4.0 through 2.4.65.\n\nUsers are recommended to upgrade to version 2.4.66 which fixes the issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Apache HTTP Server: CGI environment variable override",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-manual-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-65082"
},
{
"category": "external",
"summary": "RHBZ#2419139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419139"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-65082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65082"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-65082",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-65082"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2025-12-05T10:46:27.138000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-22T01:33:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-manual-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23732"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-manual-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-manual-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: Apache HTTP Server: CGI environment variable override"
},
{
"cve": "CVE-2025-66200",
"cwe": {
"id": "CWE-305",
"name": "Authentication Bypass by Primary Weakness"
},
"discovery_date": "2025-12-05T12:00:53.623799+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419262"
}
],
"notes": [
{
"category": "description",
"text": "mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid.\n\nThis issue affects Apache HTTP Server: from 2.4.7 through 2.4.65.\n\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-manual-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66200"
},
{
"category": "external",
"summary": "RHBZ#2419262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419262"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66200"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66200",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66200"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/12/04/8",
"url": "http://www.openwall.com/lists/oss-security/2025/12/04/8"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2025-12-05T11:02:25.722000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-22T01:33:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-manual-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23732"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-manual-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-devel-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-manual-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.src::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debuginfo-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_md-debugsource-1:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.aarch64::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.ppc64le::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.s390x::httpd:2.4",
"AppStream-8.10.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64::httpd:2.4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo"
}
]
}
OPENSUSE-SU-2025:15808-1
Vulnerability from csaf_opensuse - Published: 2025-12-10 00:00 - Updated: 2025-12-10 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "apache2-2.4.66-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the apache2-2.4.66-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15808",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15808-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55753 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-59775 page",
"url": "https://www.suse.com/security/cve/CVE-2025-59775/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-65082 page",
"url": "https://www.suse.com/security/cve/CVE-2025-65082/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-66200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-66200/"
}
],
"title": "apache2-2.4.66-1.1 on GA media",
"tracking": {
"current_release_date": "2025-12-10T00:00:00Z",
"generator": {
"date": "2025-12-10T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15808-1",
"initial_release_date": "2025-12-10T00:00:00Z",
"revision_history": [
{
"date": "2025-12-10T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.66-1.1.aarch64",
"product": {
"name": "apache2-2.4.66-1.1.aarch64",
"product_id": "apache2-2.4.66-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.66-1.1.ppc64le",
"product": {
"name": "apache2-2.4.66-1.1.ppc64le",
"product_id": "apache2-2.4.66-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.66-1.1.s390x",
"product": {
"name": "apache2-2.4.66-1.1.s390x",
"product_id": "apache2-2.4.66-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.66-1.1.x86_64",
"product": {
"name": "apache2-2.4.66-1.1.x86_64",
"product_id": "apache2-2.4.66-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.66-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-2.4.66-1.1.aarch64"
},
"product_reference": "apache2-2.4.66-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.66-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-2.4.66-1.1.ppc64le"
},
"product_reference": "apache2-2.4.66-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.66-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-2.4.66-1.1.s390x"
},
"product_reference": "apache2-2.4.66-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.66-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-2.4.66-1.1.x86_64"
},
"product_reference": "apache2-2.4.66-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55753"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.\n\nThis issue affects Apache HTTP Server: from 2.4.30 before 2.4.66.\n\n\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.66-1.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55753",
"url": "https://www.suse.com/security/cve/CVE-2025-55753"
},
{
"category": "external",
"summary": "SUSE Bug 1254511 for CVE-2025-55753",
"url": "https://bugzilla.suse.com/1254511"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.66-1.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:apache2-2.4.66-1.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-10T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-55753"
},
{
"cve": "CVE-2025-58098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58098"
}
],
"notes": [
{
"category": "general",
"text": "Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd=\"...\" directives.\n\nThis issue affects Apache HTTP Server before 2.4.66.\n\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.66-1.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58098",
"url": "https://www.suse.com/security/cve/CVE-2025-58098"
},
{
"category": "external",
"summary": "SUSE Bug 1254512 for CVE-2025-58098",
"url": "https://bugzilla.suse.com/1254512"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.66-1.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:apache2-2.4.66-1.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-10T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-58098"
},
{
"cve": "CVE-2025-59775",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-59775"
}
],
"notes": [
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF) vulnerability \n\n in Apache HTTP Server on Windows \n\nwith AllowEncodedSlashes On and MergeSlashes Off allows to potentially leak NTLM \nhashes to a malicious server via SSRF and malicious requests or content\n\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.66-1.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-59775",
"url": "https://www.suse.com/security/cve/CVE-2025-59775"
},
{
"category": "external",
"summary": "SUSE Bug 1254516 for CVE-2025-59775",
"url": "https://bugzilla.suse.com/1254516"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.66-1.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-10T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-59775"
},
{
"cve": "CVE-2025-65082",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-65082"
}
],
"notes": [
{
"category": "general",
"text": "Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.\n\nThis issue affects Apache HTTP Server from 2.4.0 through 2.4.65.\n\nUsers are recommended to upgrade to version 2.4.66 which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.66-1.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-65082",
"url": "https://www.suse.com/security/cve/CVE-2025-65082"
},
{
"category": "external",
"summary": "SUSE Bug 1254514 for CVE-2025-65082",
"url": "https://bugzilla.suse.com/1254514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.66-1.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:apache2-2.4.66-1.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-10T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-65082"
},
{
"cve": "CVE-2025-66200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-66200"
}
],
"notes": [
{
"category": "general",
"text": "mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid.\n\nThis issue affects Apache HTTP Server: from 2.4.7 through 2.4.65.\n\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.66-1.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-66200",
"url": "https://www.suse.com/security/cve/CVE-2025-66200"
},
{
"category": "external",
"summary": "SUSE Bug 1254515 for CVE-2025-66200",
"url": "https://bugzilla.suse.com/1254515"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.66-1.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:apache2-2.4.66-1.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.66-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-10T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-66200"
}
]
}
NCSC-2026-0021
Vulnerability from csaf_ncscnl - Published: 2026-01-21 09:19 - Updated: 2026-01-21 09:19Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in Oracle Database Server producten.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden in Oracle Database Server stellen niet-geauthenticeerde aanvallers in staat om de integriteit en vertrouwelijkheid van gegevens te compromitteren. Dit kan leiden tot ongeautoriseerde toegang tot gevoelige data en zelfs een mogelijke overname van de SQLcl-component. ",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)",
"title": "CWE-93"
},
{
"category": "general",
"text": "Improper Neutralization of Escape, Meta, or Control Sequences",
"title": "CWE-150"
},
{
"category": "general",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Improper Validation of Certificate with Host Mismatch",
"title": "CWE-297"
},
{
"category": "general",
"text": "Inadequate Encryption Strength",
"title": "CWE-326"
},
{
"category": "general",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Use of Uninitialized Variable",
"title": "CWE-457"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
},
{
"category": "general",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "general",
"text": "CWE-1035",
"title": "CWE-1035"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://www.oracle.com/security-alerts/cpujan2026.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Database Server producten",
"tracking": {
"current_release_date": "2026-01-21T09:19:00.000449Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.3"
}
},
"id": "NCSC-2026-0021",
"initial_release_date": "2026-01-21T09:19:00.000449Z",
"revision_history": [
{
"date": "2026-01-21T09:19:00.000449Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-1"
}
}
],
"category": "product_name",
"name": "Core RDBMS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-2"
}
}
],
"category": "product_name",
"name": "Essbase"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-3"
}
}
],
"category": "product_name",
"name": "Fleet Patching and Provisioning"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-4"
}
}
],
"category": "product_name",
"name": "GoldenGate"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-5"
}
}
],
"category": "product_name",
"name": "GoldenGate Big Data and Application Adapters"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-6"
}
}
],
"category": "product_name",
"name": "Goldengate Stream Analytics"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-7"
}
}
],
"category": "product_name",
"name": "GraalVM"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-8"
}
}
],
"category": "product_name",
"name": "Graph Server And Client"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-9"
}
}
],
"category": "product_name",
"name": "Java Virtual Machine"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-10"
}
}
],
"category": "product_name",
"name": "NoSQL Database"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-11"
}
}
],
"category": "product_name",
"name": "Oracle APEX Sample Applications"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-12"
}
}
],
"category": "product_name",
"name": "Oracle Database Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-13"
}
}
],
"category": "product_name",
"name": "Oracle Graal Development Kit for Micronaut"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-14"
}
}
],
"category": "product_name",
"name": "Oracle Zero Data Loss Recovery Appliance Software"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-15"
}
}
],
"category": "product_name",
"name": "SQLcl"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-16"
}
}
],
"category": "product_name",
"name": "Secure Backup"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-17"
}
}
],
"category": "product_name",
"name": "Spatial and Graph"
}
],
"category": "vendor",
"name": "Oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-8194",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "description",
"text": "Recent updates for Python 3 address multiple vulnerabilities, including denial of service risks in the tarfile module and HTML parsing, affecting various versions and leading to potential infinite loops and deadlocks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-8194 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-8194.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2025-8194"
},
{
"cve": "CVE-2025-12383",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Oracle Database Server versions 23.4.0-23.26.0 have a vulnerability in the Fleet Patching and Provisioning component, while Eclipse Jersey versions 2.45, 3.0.16, and 3.1.9 may ignore critical SSL configurations due to a race condition.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-12383 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-12383.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2025-12383"
},
{
"cve": "CVE-2025-30065",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle NoSQL Database and Apache Parquet allow for significant security risks, including arbitrary code execution and database compromise, affecting versions 1.5 and 1.6 of Oracle NoSQL and 1.15.0 and earlier of Apache Parquet.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30065 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-30065.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2025-30065"
},
{
"cve": "CVE-2025-48924",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Multiple vulnerabilities have been identified in Oracle WebLogic Server and Oracle Communications ASAP, both allowing unauthenticated partial denial of service, alongside an uncontrolled recursion issue in Apache Commons Lang leading to potential application crashes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48924 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48924.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2025-48924"
},
{
"cve": "CVE-2025-54874",
"cwe": {
"id": "CWE-457",
"name": "Use of Uninitialized Variable"
},
"notes": [
{
"category": "other",
"text": "Use of Uninitialized Variable",
"title": "CWE-457"
},
{
"category": "description",
"text": "Oracle Fusion Middleware has a critical vulnerability (CVSS 9.8) allowing unauthenticated access, while OpenJPEG versions 2.5.1 to 2.5.3 contain a flaw leading to out-of-bounds heap memory writes.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-54874 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-54874.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2025-54874"
},
{
"cve": "CVE-2025-55039",
"cwe": {
"id": "CWE-326",
"name": "Inadequate Encryption Strength"
},
"notes": [
{
"category": "other",
"text": "Inadequate Encryption Strength",
"title": "CWE-326"
},
{
"category": "other",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Apache Spark versions prior to 4.0.0, 3.5.2, and 3.4.4 have a vulnerability due to insecure RPC encryption, while Oracle GoldenGate Stream Analytics versions 19.1.0.0.0-19.1.0.0.11 allow unauthorized data access.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-55039 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55039.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2025-55039"
},
{
"cve": "CVE-2025-59250",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "A vulnerability in Oracle GoldenGate\u0027s JDBC Driver for SQL Server (versions 21.3-21.20 and 23.4-23.10) allows unauthenticated attackers to exploit improper input validation, posing significant confidentiality and integrity risks with a CVSS score of 8.1.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-59250 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59250.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2025-59250"
},
{
"cve": "CVE-2025-59419",
"cwe": {
"id": "CWE-93",
"name": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)",
"title": "CWE-93"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Netty\u0027s SMTP codec has a command injection vulnerability allowing email forgery, while Oracle GoldenGate Big Data and Application Adapters are susceptible to denial of service attacks by low-privileged users.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-59419 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59419.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2025-59419"
},
{
"cve": "CVE-2025-61755",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "description",
"text": "Vulnerabilities in Oracle GraalVM for JDK and the GraalVM Multilingual Engine of Oracle Database Server allow unauthorized data access, with CVSS scores of 3.7 and 3.1, respectively.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-61755 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-61755.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2025-61755"
},
{
"cve": "CVE-2025-61795",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Apache Tomcat and Oracle Communications Unified Assurance have critical vulnerabilities related to Denial of Service (DoS) risks, affecting multiple versions and requiring updates to address issues like improper resource shutdown and HTTP access exploitation.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-61795 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-61795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2025-61795"
},
{
"cve": "CVE-2025-65082",
"cwe": {
"id": "CWE-150",
"name": "Improper Neutralization of Escape, Meta, or Control Sequences"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Escape, Meta, or Control Sequences",
"title": "CWE-150"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Unified Assurance and Apache HTTP Server versions 2.4.0 to 2.4.65 expose systems to unauthorized data manipulation, denial of service, and sensitive information disclosure through various exploitation methods.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-65082 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-65082.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2025-65082"
},
{
"cve": "CVE-2025-66566",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"notes": [
{
"category": "other",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "other",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
},
{
"category": "description",
"text": "Multiple vulnerabilities in lz4-java (1.10.0 and earlier) and Oracle Essbase (21.8.0.0.0) allow unauthorized access and sensitive data disclosure due to insufficient buffer clearing and unauthenticated access, respectively.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-66566 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-66566.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2025-66566"
},
{
"cve": "CVE-2025-67735",
"cwe": {
"id": "CWE-93",
"name": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)",
"title": "CWE-93"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "The `io.netty.handler.codec.http.HttpRequestEncoder` is vulnerable to CRLF injection in the request URI, leading to request smuggling, while the Oracle Graal Development Kit for Micronaut has an exploitable vulnerability affecting specific versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-67735 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-67735.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2025-67735"
},
{
"cve": "CVE-2025-68161",
"cwe": {
"id": "CWE-297",
"name": "Improper Validation of Certificate with Host Mismatch"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Certificate with Host Mismatch",
"title": "CWE-297"
},
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Apache Log4j Core versions 2.0-beta9 to 2.25.2 lack TLS hostname verification in the Socket Appender, while Oracle\u0027s Primavera Gateway has a vulnerability allowing unauthenticated access via TLS.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-68161 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-68161.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2025-68161"
},
{
"cve": "CVE-2026-21931",
"notes": [
{
"category": "description",
"text": "A vulnerability in Oracle APEX Sample Applications allows low-privileged attackers to compromise applications, leading to unauthorized data access and modifications across several supported versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-21931 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21931.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2026-21931"
},
{
"cve": "CVE-2026-21939",
"notes": [
{
"category": "description",
"text": "A vulnerability in Oracle Database Server\u0027s SQLcl component (versions 23.4.0-23.26.0) allows unauthenticated attackers to compromise SQLcl with human interaction, rated with a CVSS 3.1 Base Score of 7.0.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-21939 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21939.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2026-21939"
},
{
"cve": "CVE-2026-21975",
"notes": [
{
"category": "description",
"text": "A vulnerability in the Java VM component of Oracle Database Server versions 19.3-19.29 and 21.3-21.20 allows high-privileged authenticated users to potentially cause a denial of service, with a CVSS score of 4.5.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-21975 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21975.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2026-21975"
},
{
"cve": "CVE-2026-21977",
"notes": [
{
"category": "description",
"text": "A vulnerability in Oracle Zero Data Loss Recovery Appliance Software (versions 23.1.0-23.1.202509) allows unauthenticated attackers to potentially gain unauthorized read access to data, with a CVSS score of 3.1.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-21977 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21977.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2026-21977"
}
]
}
SUSE-SU-2026:0020-1
Vulnerability from csaf_suse - Published: 2026-01-05 11:08 - Updated: 2026-01-05 11:08Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for apache2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for apache2 fixes the following issues:\n\n- CVE-2025-55753: Fixed mod_md (ACME) unintended retry intervals (bsc#1254511)\n- CVE-2025-65082: Fixed CGI environment variable override (bsc#1254514)\n- CVE-2025-58098: Fixed Server Side Includes adding query string to #exec cmd=... (bsc#1254512)\n- CVE-2025-66200: Fixed mod_userdir+suexec bypass via AllowOverride FileInfo (bsc#1254515)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-20,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-20,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-20,openSUSE-SLE-15.6-2026-20",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0020-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0020-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260020-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0020-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023668.html"
},
{
"category": "self",
"summary": "SUSE Bug 1254511",
"url": "https://bugzilla.suse.com/1254511"
},
{
"category": "self",
"summary": "SUSE Bug 1254512",
"url": "https://bugzilla.suse.com/1254512"
},
{
"category": "self",
"summary": "SUSE Bug 1254514",
"url": "https://bugzilla.suse.com/1254514"
},
{
"category": "self",
"summary": "SUSE Bug 1254515",
"url": "https://bugzilla.suse.com/1254515"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55753 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-65082 page",
"url": "https://www.suse.com/security/cve/CVE-2025-65082/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-66200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-66200/"
}
],
"title": "Security update for apache2",
"tracking": {
"current_release_date": "2026-01-05T11:08:42Z",
"generator": {
"date": "2026-01-05T11:08:42Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0020-1",
"initial_release_date": "2026-01-05T11:08:42Z",
"revision_history": [
{
"date": "2026-01-05T11:08:42Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.58-150600.5.41.1.aarch64",
"product": {
"name": "apache2-2.4.58-150600.5.41.1.aarch64",
"product_id": "apache2-2.4.58-150600.5.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.58-150600.5.41.1.aarch64",
"product": {
"name": "apache2-devel-2.4.58-150600.5.41.1.aarch64",
"product_id": "apache2-devel-2.4.58-150600.5.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.58-150600.5.41.1.aarch64",
"product": {
"name": "apache2-event-2.4.58-150600.5.41.1.aarch64",
"product_id": "apache2-event-2.4.58-150600.5.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.58-150600.5.41.1.aarch64",
"product": {
"name": "apache2-prefork-2.4.58-150600.5.41.1.aarch64",
"product_id": "apache2-prefork-2.4.58-150600.5.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.58-150600.5.41.1.aarch64",
"product": {
"name": "apache2-utils-2.4.58-150600.5.41.1.aarch64",
"product_id": "apache2-utils-2.4.58-150600.5.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.58-150600.5.41.1.aarch64",
"product": {
"name": "apache2-worker-2.4.58-150600.5.41.1.aarch64",
"product_id": "apache2-worker-2.4.58-150600.5.41.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.58-150600.5.41.1.i586",
"product": {
"name": "apache2-2.4.58-150600.5.41.1.i586",
"product_id": "apache2-2.4.58-150600.5.41.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.58-150600.5.41.1.i586",
"product": {
"name": "apache2-devel-2.4.58-150600.5.41.1.i586",
"product_id": "apache2-devel-2.4.58-150600.5.41.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.58-150600.5.41.1.i586",
"product": {
"name": "apache2-event-2.4.58-150600.5.41.1.i586",
"product_id": "apache2-event-2.4.58-150600.5.41.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.58-150600.5.41.1.i586",
"product": {
"name": "apache2-prefork-2.4.58-150600.5.41.1.i586",
"product_id": "apache2-prefork-2.4.58-150600.5.41.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.58-150600.5.41.1.i586",
"product": {
"name": "apache2-utils-2.4.58-150600.5.41.1.i586",
"product_id": "apache2-utils-2.4.58-150600.5.41.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.58-150600.5.41.1.i586",
"product": {
"name": "apache2-worker-2.4.58-150600.5.41.1.i586",
"product_id": "apache2-worker-2.4.58-150600.5.41.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-manual-2.4.58-150600.5.41.1.noarch",
"product": {
"name": "apache2-manual-2.4.58-150600.5.41.1.noarch",
"product_id": "apache2-manual-2.4.58-150600.5.41.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.58-150600.5.41.1.ppc64le",
"product": {
"name": "apache2-2.4.58-150600.5.41.1.ppc64le",
"product_id": "apache2-2.4.58-150600.5.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"product": {
"name": "apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"product_id": "apache2-devel-2.4.58-150600.5.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.58-150600.5.41.1.ppc64le",
"product": {
"name": "apache2-event-2.4.58-150600.5.41.1.ppc64le",
"product_id": "apache2-event-2.4.58-150600.5.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"product": {
"name": "apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"product_id": "apache2-prefork-2.4.58-150600.5.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"product": {
"name": "apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"product_id": "apache2-utils-2.4.58-150600.5.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"product": {
"name": "apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"product_id": "apache2-worker-2.4.58-150600.5.41.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.58-150600.5.41.1.s390x",
"product": {
"name": "apache2-2.4.58-150600.5.41.1.s390x",
"product_id": "apache2-2.4.58-150600.5.41.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.58-150600.5.41.1.s390x",
"product": {
"name": "apache2-devel-2.4.58-150600.5.41.1.s390x",
"product_id": "apache2-devel-2.4.58-150600.5.41.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.58-150600.5.41.1.s390x",
"product": {
"name": "apache2-event-2.4.58-150600.5.41.1.s390x",
"product_id": "apache2-event-2.4.58-150600.5.41.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.58-150600.5.41.1.s390x",
"product": {
"name": "apache2-prefork-2.4.58-150600.5.41.1.s390x",
"product_id": "apache2-prefork-2.4.58-150600.5.41.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.58-150600.5.41.1.s390x",
"product": {
"name": "apache2-utils-2.4.58-150600.5.41.1.s390x",
"product_id": "apache2-utils-2.4.58-150600.5.41.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.58-150600.5.41.1.s390x",
"product": {
"name": "apache2-worker-2.4.58-150600.5.41.1.s390x",
"product_id": "apache2-worker-2.4.58-150600.5.41.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.58-150600.5.41.1.x86_64",
"product": {
"name": "apache2-2.4.58-150600.5.41.1.x86_64",
"product_id": "apache2-2.4.58-150600.5.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.58-150600.5.41.1.x86_64",
"product": {
"name": "apache2-devel-2.4.58-150600.5.41.1.x86_64",
"product_id": "apache2-devel-2.4.58-150600.5.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.58-150600.5.41.1.x86_64",
"product": {
"name": "apache2-event-2.4.58-150600.5.41.1.x86_64",
"product_id": "apache2-event-2.4.58-150600.5.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"product": {
"name": "apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"product_id": "apache2-prefork-2.4.58-150600.5.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.58-150600.5.41.1.x86_64",
"product": {
"name": "apache2-utils-2.4.58-150600.5.41.1.x86_64",
"product_id": "apache2-utils-2.4.58-150600.5.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.58-150600.5.41.1.x86_64",
"product": {
"name": "apache2-worker-2.4.58-150600.5.41.1.x86_64",
"product_id": "apache2-worker-2.4.58-150600.5.41.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.58-150600.5.41.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.aarch64"
},
"product_reference": "apache2-2.4.58-150600.5.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.58-150600.5.41.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.ppc64le"
},
"product_reference": "apache2-2.4.58-150600.5.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.58-150600.5.41.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.s390x"
},
"product_reference": "apache2-2.4.58-150600.5.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.58-150600.5.41.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.x86_64"
},
"product_reference": "apache2-2.4.58-150600.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.58-150600.5.41.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.aarch64"
},
"product_reference": "apache2-devel-2.4.58-150600.5.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.58-150600.5.41.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.ppc64le"
},
"product_reference": "apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.58-150600.5.41.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.s390x"
},
"product_reference": "apache2-devel-2.4.58-150600.5.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.58-150600.5.41.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.x86_64"
},
"product_reference": "apache2-devel-2.4.58-150600.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.58-150600.5.41.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.aarch64"
},
"product_reference": "apache2-prefork-2.4.58-150600.5.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.58-150600.5.41.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.58-150600.5.41.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.s390x"
},
"product_reference": "apache2-prefork-2.4.58-150600.5.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.58-150600.5.41.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.58-150600.5.41.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.aarch64"
},
"product_reference": "apache2-utils-2.4.58-150600.5.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.58-150600.5.41.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.58-150600.5.41.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.s390x"
},
"product_reference": "apache2-utils-2.4.58-150600.5.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.58-150600.5.41.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.x86_64"
},
"product_reference": "apache2-utils-2.4.58-150600.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.58-150600.5.41.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.aarch64"
},
"product_reference": "apache2-worker-2.4.58-150600.5.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.58-150600.5.41.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.58-150600.5.41.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.s390x"
},
"product_reference": "apache2-worker-2.4.58-150600.5.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.58-150600.5.41.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.x86_64"
},
"product_reference": "apache2-worker-2.4.58-150600.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.58-150600.5.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-2.4.58-150600.5.41.1.ppc64le"
},
"product_reference": "apache2-2.4.58-150600.5.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.58-150600.5.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-2.4.58-150600.5.41.1.x86_64"
},
"product_reference": "apache2-2.4.58-150600.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.58-150600.5.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-devel-2.4.58-150600.5.41.1.ppc64le"
},
"product_reference": "apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.58-150600.5.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-devel-2.4.58-150600.5.41.1.x86_64"
},
"product_reference": "apache2-devel-2.4.58-150600.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.58-150600.5.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-prefork-2.4.58-150600.5.41.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.58-150600.5.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-prefork-2.4.58-150600.5.41.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.58-150600.5.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-utils-2.4.58-150600.5.41.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.58-150600.5.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-utils-2.4.58-150600.5.41.1.x86_64"
},
"product_reference": "apache2-utils-2.4.58-150600.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.58-150600.5.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-worker-2.4.58-150600.5.41.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.58-150600.5.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-worker-2.4.58-150600.5.41.1.x86_64"
},
"product_reference": "apache2-worker-2.4.58-150600.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.58-150600.5.41.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.aarch64"
},
"product_reference": "apache2-2.4.58-150600.5.41.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.58-150600.5.41.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.ppc64le"
},
"product_reference": "apache2-2.4.58-150600.5.41.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.58-150600.5.41.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.s390x"
},
"product_reference": "apache2-2.4.58-150600.5.41.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.58-150600.5.41.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.x86_64"
},
"product_reference": "apache2-2.4.58-150600.5.41.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.58-150600.5.41.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.aarch64"
},
"product_reference": "apache2-devel-2.4.58-150600.5.41.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.58-150600.5.41.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.ppc64le"
},
"product_reference": "apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.58-150600.5.41.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.s390x"
},
"product_reference": "apache2-devel-2.4.58-150600.5.41.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.58-150600.5.41.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.x86_64"
},
"product_reference": "apache2-devel-2.4.58-150600.5.41.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-event-2.4.58-150600.5.41.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.aarch64"
},
"product_reference": "apache2-event-2.4.58-150600.5.41.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-event-2.4.58-150600.5.41.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.ppc64le"
},
"product_reference": "apache2-event-2.4.58-150600.5.41.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-event-2.4.58-150600.5.41.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.s390x"
},
"product_reference": "apache2-event-2.4.58-150600.5.41.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-event-2.4.58-150600.5.41.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.x86_64"
},
"product_reference": "apache2-event-2.4.58-150600.5.41.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-manual-2.4.58-150600.5.41.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-manual-2.4.58-150600.5.41.1.noarch"
},
"product_reference": "apache2-manual-2.4.58-150600.5.41.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.58-150600.5.41.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.aarch64"
},
"product_reference": "apache2-prefork-2.4.58-150600.5.41.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.58-150600.5.41.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.58-150600.5.41.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.s390x"
},
"product_reference": "apache2-prefork-2.4.58-150600.5.41.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.58-150600.5.41.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.58-150600.5.41.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.aarch64"
},
"product_reference": "apache2-utils-2.4.58-150600.5.41.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.58-150600.5.41.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.58-150600.5.41.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.s390x"
},
"product_reference": "apache2-utils-2.4.58-150600.5.41.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.58-150600.5.41.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.x86_64"
},
"product_reference": "apache2-utils-2.4.58-150600.5.41.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.58-150600.5.41.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.aarch64"
},
"product_reference": "apache2-worker-2.4.58-150600.5.41.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.58-150600.5.41.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.58-150600.5.41.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.s390x"
},
"product_reference": "apache2-worker-2.4.58-150600.5.41.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.58-150600.5.41.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.x86_64"
},
"product_reference": "apache2-worker-2.4.58-150600.5.41.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55753"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.\n\nThis issue affects Apache HTTP Server: from 2.4.30 before 2.4.66.\n\n\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-worker-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-manual-2.4.58-150600.5.41.1.noarch",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55753",
"url": "https://www.suse.com/security/cve/CVE-2025-55753"
},
{
"category": "external",
"summary": "SUSE Bug 1254511 for CVE-2025-55753",
"url": "https://bugzilla.suse.com/1254511"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-worker-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-manual-2.4.58-150600.5.41.1.noarch",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-worker-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-manual-2.4.58-150600.5.41.1.noarch",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-05T11:08:42Z",
"details": "moderate"
}
],
"title": "CVE-2025-55753"
},
{
"cve": "CVE-2025-58098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58098"
}
],
"notes": [
{
"category": "general",
"text": "Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd=\"...\" directives.\n\nThis issue affects Apache HTTP Server before 2.4.66.\n\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-worker-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-manual-2.4.58-150600.5.41.1.noarch",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58098",
"url": "https://www.suse.com/security/cve/CVE-2025-58098"
},
{
"category": "external",
"summary": "SUSE Bug 1254512 for CVE-2025-58098",
"url": "https://bugzilla.suse.com/1254512"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-worker-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-manual-2.4.58-150600.5.41.1.noarch",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-worker-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-manual-2.4.58-150600.5.41.1.noarch",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-05T11:08:42Z",
"details": "moderate"
}
],
"title": "CVE-2025-58098"
},
{
"cve": "CVE-2025-65082",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-65082"
}
],
"notes": [
{
"category": "general",
"text": "Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.\n\nThis issue affects Apache HTTP Server from 2.4.0 through 2.4.65.\n\nUsers are recommended to upgrade to version 2.4.66 which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-worker-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-manual-2.4.58-150600.5.41.1.noarch",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-65082",
"url": "https://www.suse.com/security/cve/CVE-2025-65082"
},
{
"category": "external",
"summary": "SUSE Bug 1254514 for CVE-2025-65082",
"url": "https://bugzilla.suse.com/1254514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-worker-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-manual-2.4.58-150600.5.41.1.noarch",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-worker-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-manual-2.4.58-150600.5.41.1.noarch",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-05T11:08:42Z",
"details": "moderate"
}
],
"title": "CVE-2025-65082"
},
{
"cve": "CVE-2025-66200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-66200"
}
],
"notes": [
{
"category": "general",
"text": "mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid.\n\nThis issue affects Apache HTTP Server: from 2.4.7 through 2.4.65.\n\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-worker-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-manual-2.4.58-150600.5.41.1.noarch",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-66200",
"url": "https://www.suse.com/security/cve/CVE-2025-66200"
},
{
"category": "external",
"summary": "SUSE Bug 1254515 for CVE-2025-66200",
"url": "https://bugzilla.suse.com/1254515"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-worker-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-manual-2.4.58-150600.5.41.1.noarch",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-worker-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-worker-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-manual-2.4.58-150600.5.41.1.noarch",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.41.1.x86_64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.aarch64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.ppc64le",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.s390x",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-05T11:08:42Z",
"details": "moderate"
}
],
"title": "CVE-2025-66200"
}
]
}
SUSE-SU-2026:0019-1
Vulnerability from csaf_suse - Published: 2026-01-05 11:08 - Updated: 2026-01-05 11:08Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for apache2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for apache2 fixes the following issues:\n\n- CVE-2025-55753: Fixed mod_md (ACME) unintended retry intervals (bsc#1254511)\n- CVE-2025-65082: Fixed CGI environment variable override (bsc#1254514)\n- CVE-2025-58098: Fixed Server Side Includes adding query string to #exec cmd=... (bsc#1254512)\n- CVE-2025-66200: Fixed mod_userdir+suexec bypass via AllowOverride FileInfo (bsc#1254515)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-19,SUSE-SLE-Module-Server-Applications-15-SP7-2026-19,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-19,SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-19,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-19,SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-19,SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-19,SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-19,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-19,SUSE-SLE-Product-SLES_SAP-15-SP4-2026-19,SUSE-SLE-Product-SLES_SAP-15-SP5-2026-19,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-19,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2026-19,SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2026-19",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0019-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0019-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260019-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0019-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023669.html"
},
{
"category": "self",
"summary": "SUSE Bug 1254511",
"url": "https://bugzilla.suse.com/1254511"
},
{
"category": "self",
"summary": "SUSE Bug 1254512",
"url": "https://bugzilla.suse.com/1254512"
},
{
"category": "self",
"summary": "SUSE Bug 1254514",
"url": "https://bugzilla.suse.com/1254514"
},
{
"category": "self",
"summary": "SUSE Bug 1254515",
"url": "https://bugzilla.suse.com/1254515"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55753 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-65082 page",
"url": "https://www.suse.com/security/cve/CVE-2025-65082/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-66200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-66200/"
}
],
"title": "Security update for apache2",
"tracking": {
"current_release_date": "2026-01-05T11:08:00Z",
"generator": {
"date": "2026-01-05T11:08:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0019-1",
"initial_release_date": "2026-01-05T11:08:00Z",
"revision_history": [
{
"date": "2026-01-05T11:08:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-150400.6.52.1.aarch64",
"product": {
"name": "apache2-2.4.51-150400.6.52.1.aarch64",
"product_id": "apache2-2.4.51-150400.6.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-150400.6.52.1.aarch64",
"product": {
"name": "apache2-devel-2.4.51-150400.6.52.1.aarch64",
"product_id": "apache2-devel-2.4.51-150400.6.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-150400.6.52.1.aarch64",
"product": {
"name": "apache2-event-2.4.51-150400.6.52.1.aarch64",
"product_id": "apache2-event-2.4.51-150400.6.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-150400.6.52.1.aarch64",
"product": {
"name": "apache2-example-pages-2.4.51-150400.6.52.1.aarch64",
"product_id": "apache2-example-pages-2.4.51-150400.6.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"product": {
"name": "apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"product_id": "apache2-prefork-2.4.51-150400.6.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-150400.6.52.1.aarch64",
"product": {
"name": "apache2-utils-2.4.51-150400.6.52.1.aarch64",
"product_id": "apache2-utils-2.4.51-150400.6.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-150400.6.52.1.aarch64",
"product": {
"name": "apache2-worker-2.4.51-150400.6.52.1.aarch64",
"product_id": "apache2-worker-2.4.51-150400.6.52.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-150400.6.52.1.i586",
"product": {
"name": "apache2-2.4.51-150400.6.52.1.i586",
"product_id": "apache2-2.4.51-150400.6.52.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-150400.6.52.1.i586",
"product": {
"name": "apache2-devel-2.4.51-150400.6.52.1.i586",
"product_id": "apache2-devel-2.4.51-150400.6.52.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-150400.6.52.1.i586",
"product": {
"name": "apache2-event-2.4.51-150400.6.52.1.i586",
"product_id": "apache2-event-2.4.51-150400.6.52.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-150400.6.52.1.i586",
"product": {
"name": "apache2-example-pages-2.4.51-150400.6.52.1.i586",
"product_id": "apache2-example-pages-2.4.51-150400.6.52.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-150400.6.52.1.i586",
"product": {
"name": "apache2-prefork-2.4.51-150400.6.52.1.i586",
"product_id": "apache2-prefork-2.4.51-150400.6.52.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-150400.6.52.1.i586",
"product": {
"name": "apache2-utils-2.4.51-150400.6.52.1.i586",
"product_id": "apache2-utils-2.4.51-150400.6.52.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-150400.6.52.1.i586",
"product": {
"name": "apache2-worker-2.4.51-150400.6.52.1.i586",
"product_id": "apache2-worker-2.4.51-150400.6.52.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-doc-2.4.51-150400.6.52.1.noarch",
"product": {
"name": "apache2-doc-2.4.51-150400.6.52.1.noarch",
"product_id": "apache2-doc-2.4.51-150400.6.52.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-150400.6.52.1.ppc64le",
"product": {
"name": "apache2-2.4.51-150400.6.52.1.ppc64le",
"product_id": "apache2-2.4.51-150400.6.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"product": {
"name": "apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"product_id": "apache2-devel-2.4.51-150400.6.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-150400.6.52.1.ppc64le",
"product": {
"name": "apache2-event-2.4.51-150400.6.52.1.ppc64le",
"product_id": "apache2-event-2.4.51-150400.6.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-150400.6.52.1.ppc64le",
"product": {
"name": "apache2-example-pages-2.4.51-150400.6.52.1.ppc64le",
"product_id": "apache2-example-pages-2.4.51-150400.6.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"product": {
"name": "apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"product_id": "apache2-prefork-2.4.51-150400.6.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"product": {
"name": "apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"product_id": "apache2-utils-2.4.51-150400.6.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"product": {
"name": "apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"product_id": "apache2-worker-2.4.51-150400.6.52.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-150400.6.52.1.s390x",
"product": {
"name": "apache2-2.4.51-150400.6.52.1.s390x",
"product_id": "apache2-2.4.51-150400.6.52.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-150400.6.52.1.s390x",
"product": {
"name": "apache2-devel-2.4.51-150400.6.52.1.s390x",
"product_id": "apache2-devel-2.4.51-150400.6.52.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-150400.6.52.1.s390x",
"product": {
"name": "apache2-event-2.4.51-150400.6.52.1.s390x",
"product_id": "apache2-event-2.4.51-150400.6.52.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-150400.6.52.1.s390x",
"product": {
"name": "apache2-example-pages-2.4.51-150400.6.52.1.s390x",
"product_id": "apache2-example-pages-2.4.51-150400.6.52.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-150400.6.52.1.s390x",
"product": {
"name": "apache2-prefork-2.4.51-150400.6.52.1.s390x",
"product_id": "apache2-prefork-2.4.51-150400.6.52.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-150400.6.52.1.s390x",
"product": {
"name": "apache2-utils-2.4.51-150400.6.52.1.s390x",
"product_id": "apache2-utils-2.4.51-150400.6.52.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-150400.6.52.1.s390x",
"product": {
"name": "apache2-worker-2.4.51-150400.6.52.1.s390x",
"product_id": "apache2-worker-2.4.51-150400.6.52.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-150400.6.52.1.x86_64",
"product": {
"name": "apache2-2.4.51-150400.6.52.1.x86_64",
"product_id": "apache2-2.4.51-150400.6.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-150400.6.52.1.x86_64",
"product": {
"name": "apache2-devel-2.4.51-150400.6.52.1.x86_64",
"product_id": "apache2-devel-2.4.51-150400.6.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-150400.6.52.1.x86_64",
"product": {
"name": "apache2-event-2.4.51-150400.6.52.1.x86_64",
"product_id": "apache2-event-2.4.51-150400.6.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-150400.6.52.1.x86_64",
"product": {
"name": "apache2-example-pages-2.4.51-150400.6.52.1.x86_64",
"product_id": "apache2-example-pages-2.4.51-150400.6.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"product": {
"name": "apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"product_id": "apache2-prefork-2.4.51-150400.6.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-150400.6.52.1.x86_64",
"product": {
"name": "apache2-utils-2.4.51-150400.6.52.1.x86_64",
"product_id": "apache2-utils-2.4.51-150400.6.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-150400.6.52.1.x86_64",
"product": {
"name": "apache2-worker-2.4.51-150400.6.52.1.x86_64",
"product_id": "apache2-worker-2.4.51-150400.6.52.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-server-applications:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy LTS 4.3",
"product": {
"name": "SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy-lts:4.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server LTS 4.3",
"product": {
"name": "SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server-lts:4.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-150400.6.52.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-doc-2.4.51-150400.6.52.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-150400.6.52.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.52.1.aarch64"
},
"product_reference": "apache2-2.4.51-150400.6.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.52.1.aarch64"
},
"product_reference": "apache2-devel-2.4.51-150400.6.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-devel-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-150400.6.52.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-doc-2.4.51-150400.6.52.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-150400.6.52.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.aarch64"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.52.1.aarch64"
},
"product_reference": "apache2-utils-2.4.51-150400.6.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-utils-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.52.1.aarch64"
},
"product_reference": "apache2-worker-2.4.51-150400.6.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-worker-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.aarch64"
},
"product_reference": "apache2-2.4.51-150400.6.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64"
},
"product_reference": "apache2-devel-2.4.51-150400.6.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-devel-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-150400.6.52.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-150400.6.52.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64"
},
"product_reference": "apache2-utils-2.4.51-150400.6.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-utils-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64"
},
"product_reference": "apache2-worker-2.4.51-150400.6.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-worker-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-2.4.51-150400.6.52.1.aarch64"
},
"product_reference": "apache2-2.4.51-150400.6.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-devel-2.4.51-150400.6.52.1.aarch64"
},
"product_reference": "apache2-devel-2.4.51-150400.6.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-devel-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-devel-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-150400.6.52.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-doc-2.4.51-150400.6.52.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-150400.6.52.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.aarch64"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-utils-2.4.51-150400.6.52.1.aarch64"
},
"product_reference": "apache2-utils-2.4.51-150400.6.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-utils-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-utils-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-worker-2.4.51-150400.6.52.1.aarch64"
},
"product_reference": "apache2-worker-2.4.51-150400.6.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-worker-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-worker-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.aarch64"
},
"product_reference": "apache2-2.4.51-150400.6.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64"
},
"product_reference": "apache2-devel-2.4.51-150400.6.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-devel-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-150400.6.52.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-150400.6.52.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64"
},
"product_reference": "apache2-utils-2.4.51-150400.6.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-utils-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64"
},
"product_reference": "apache2-worker-2.4.51-150400.6.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-worker-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.52.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.aarch64"
},
"product_reference": "apache2-2.4.51-150400.6.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.52.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.ppc64le"
},
"product_reference": "apache2-2.4.51-150400.6.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.52.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.s390x"
},
"product_reference": "apache2-2.4.51-150400.6.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.52.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64"
},
"product_reference": "apache2-devel-2.4.51-150400.6.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.52.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.ppc64le"
},
"product_reference": "apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.52.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.s390x"
},
"product_reference": "apache2-devel-2.4.51-150400.6.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-devel-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-150400.6.52.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-150400.6.52.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.52.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.52.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.52.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.s390x"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.52.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64"
},
"product_reference": "apache2-utils-2.4.51-150400.6.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.52.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.52.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.s390x"
},
"product_reference": "apache2-utils-2.4.51-150400.6.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-utils-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.52.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64"
},
"product_reference": "apache2-worker-2.4.51-150400.6.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.52.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.52.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.s390x"
},
"product_reference": "apache2-worker-2.4.51-150400.6.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-worker-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.52.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.aarch64"
},
"product_reference": "apache2-2.4.51-150400.6.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.52.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.ppc64le"
},
"product_reference": "apache2-2.4.51-150400.6.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.52.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.s390x"
},
"product_reference": "apache2-2.4.51-150400.6.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.52.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64"
},
"product_reference": "apache2-devel-2.4.51-150400.6.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.52.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.ppc64le"
},
"product_reference": "apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.52.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.s390x"
},
"product_reference": "apache2-devel-2.4.51-150400.6.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-devel-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-150400.6.52.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-150400.6.52.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.52.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.52.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.52.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.s390x"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.52.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64"
},
"product_reference": "apache2-utils-2.4.51-150400.6.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.52.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.52.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.s390x"
},
"product_reference": "apache2-utils-2.4.51-150400.6.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-utils-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.52.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64"
},
"product_reference": "apache2-worker-2.4.51-150400.6.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.52.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.52.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.s390x"
},
"product_reference": "apache2-worker-2.4.51-150400.6.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-worker-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-150400.6.52.1.noarch as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-150400.6.52.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.52.1.ppc64le"
},
"product_reference": "apache2-2.4.51-150400.6.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.52.1.ppc64le"
},
"product_reference": "apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-devel-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-150400.6.52.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-doc-2.4.51-150400.6.52.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-150400.6.52.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.52.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.52.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-utils-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.52.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-worker-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-2.4.51-150400.6.52.1.ppc64le"
},
"product_reference": "apache2-2.4.51-150400.6.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-devel-2.4.51-150400.6.52.1.ppc64le"
},
"product_reference": "apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-devel-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-devel-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-150400.6.52.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-doc-2.4.51-150400.6.52.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-150400.6.52.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-prefork-2.4.51-150400.6.52.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-prefork-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-utils-2.4.51-150400.6.52.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-utils-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-utils-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-worker-2.4.51-150400.6.52.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-worker-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-worker-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-150400.6.52.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-doc-2.4.51-150400.6.52.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-150400.6.52.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.52.1.x86_64 as component of SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3:apache2-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.52.1.x86_64 as component of SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-devel-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-150400.6.52.1.noarch as component of SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3:apache2-doc-2.4.51-150400.6.52.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-150400.6.52.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.52.1.x86_64 as component of SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.52.1.x86_64 as component of SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-utils-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.52.1.x86_64 as component of SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-worker-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.52.1.ppc64le as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.ppc64le"
},
"product_reference": "apache2-2.4.51-150400.6.52.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.52.1.s390x as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.s390x"
},
"product_reference": "apache2-2.4.51-150400.6.52.1.s390x",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.52.1.x86_64 as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.52.1.ppc64le as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.ppc64le"
},
"product_reference": "apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.52.1.s390x as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.s390x"
},
"product_reference": "apache2-devel-2.4.51-150400.6.52.1.s390x",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.52.1.x86_64 as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-devel-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-150400.6.52.1.noarch as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:apache2-doc-2.4.51-150400.6.52.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-150400.6.52.1.noarch",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.52.1.ppc64le as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.52.1.s390x as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.s390x"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.52.1.s390x",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.52.1.x86_64 as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.52.1.ppc64le as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.52.1.s390x as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.s390x"
},
"product_reference": "apache2-utils-2.4.51-150400.6.52.1.s390x",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.52.1.x86_64 as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-utils-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.52.1.ppc64le as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.52.1.s390x as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.s390x"
},
"product_reference": "apache2-worker-2.4.51-150400.6.52.1.s390x",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.52.1.x86_64 as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.x86_64"
},
"product_reference": "apache2-worker-2.4.51-150400.6.52.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55753"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.\n\nThis issue affects Apache HTTP Server: from 2.4.30 before 2.4.66.\n\n\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Proxy LTS 4.3:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Proxy LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55753",
"url": "https://www.suse.com/security/cve/CVE-2025-55753"
},
{
"category": "external",
"summary": "SUSE Bug 1254511 for CVE-2025-55753",
"url": "https://bugzilla.suse.com/1254511"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Proxy LTS 4.3:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Proxy LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Proxy LTS 4.3:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Proxy LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-05T11:08:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-55753"
},
{
"cve": "CVE-2025-58098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58098"
}
],
"notes": [
{
"category": "general",
"text": "Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd=\"...\" directives.\n\nThis issue affects Apache HTTP Server before 2.4.66.\n\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Proxy LTS 4.3:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Proxy LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58098",
"url": "https://www.suse.com/security/cve/CVE-2025-58098"
},
{
"category": "external",
"summary": "SUSE Bug 1254512 for CVE-2025-58098",
"url": "https://bugzilla.suse.com/1254512"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Proxy LTS 4.3:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Proxy LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Proxy LTS 4.3:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Proxy LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-05T11:08:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-58098"
},
{
"cve": "CVE-2025-65082",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-65082"
}
],
"notes": [
{
"category": "general",
"text": "Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.\n\nThis issue affects Apache HTTP Server from 2.4.0 through 2.4.65.\n\nUsers are recommended to upgrade to version 2.4.66 which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Proxy LTS 4.3:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Proxy LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-65082",
"url": "https://www.suse.com/security/cve/CVE-2025-65082"
},
{
"category": "external",
"summary": "SUSE Bug 1254514 for CVE-2025-65082",
"url": "https://bugzilla.suse.com/1254514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Proxy LTS 4.3:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Proxy LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Proxy LTS 4.3:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Proxy LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-05T11:08:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-65082"
},
{
"cve": "CVE-2025-66200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-66200"
}
],
"notes": [
{
"category": "general",
"text": "mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid.\n\nThis issue affects Apache HTTP Server: from 2.4.7 through 2.4.65.\n\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Proxy LTS 4.3:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Proxy LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-66200",
"url": "https://www.suse.com/security/cve/CVE-2025-66200"
},
{
"category": "external",
"summary": "SUSE Bug 1254515 for CVE-2025-66200",
"url": "https://bugzilla.suse.com/1254515"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Proxy LTS 4.3:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Proxy LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Proxy LTS 4.3:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Proxy LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Proxy LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-devel-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-doc-2.4.51-150400.6.52.1.noarch",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-prefork-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-utils-2.4.51-150400.6.52.1.x86_64",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.ppc64le",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.s390x",
"SUSE Manager Server LTS 4.3:apache2-worker-2.4.51-150400.6.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-05T11:08:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-66200"
}
]
}
SUSE-SU-2025:4518-1
Vulnerability from csaf_suse - Published: 2025-12-23 19:07 - Updated: 2025-12-23 19:07Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for apache2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for apache2 fixes the following issues:\n\n- CVE-2025-55753: Fixed mod_md (ACME) unintended retry intervals (bsc#1254511)\n- CVE-2025-65082: Fixed CGI environment variable override (bsc#1254514)\n- CVE-2025-58098: Fixed Server Side Includes adding query string to #exec cmd=... (bsc#1254512)\n- CVE-2025-66200: Fixed mod_userdir+suexec bypass via AllowOverride FileInfo (bsc#1254515)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4518,SUSE-SLE-Module-Basesystem-15-SP7-2025-4518,SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-4518,SUSE-SLE-Module-Server-Applications-15-SP7-2025-4518",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4518-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4518-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254518-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4518-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023648.html"
},
{
"category": "self",
"summary": "SUSE Bug 1254511",
"url": "https://bugzilla.suse.com/1254511"
},
{
"category": "self",
"summary": "SUSE Bug 1254512",
"url": "https://bugzilla.suse.com/1254512"
},
{
"category": "self",
"summary": "SUSE Bug 1254514",
"url": "https://bugzilla.suse.com/1254514"
},
{
"category": "self",
"summary": "SUSE Bug 1254515",
"url": "https://bugzilla.suse.com/1254515"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55753 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-65082 page",
"url": "https://www.suse.com/security/cve/CVE-2025-65082/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-66200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-66200/"
}
],
"title": "Security update for apache2",
"tracking": {
"current_release_date": "2025-12-23T19:07:45Z",
"generator": {
"date": "2025-12-23T19:07:45Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4518-1",
"initial_release_date": "2025-12-23T19:07:45Z",
"revision_history": [
{
"date": "2025-12-23T19:07:45Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.62-150700.4.9.1.aarch64",
"product": {
"name": "apache2-2.4.62-150700.4.9.1.aarch64",
"product_id": "apache2-2.4.62-150700.4.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.62-150700.4.9.1.aarch64",
"product": {
"name": "apache2-devel-2.4.62-150700.4.9.1.aarch64",
"product_id": "apache2-devel-2.4.62-150700.4.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.62-150700.4.9.1.aarch64",
"product": {
"name": "apache2-event-2.4.62-150700.4.9.1.aarch64",
"product_id": "apache2-event-2.4.62-150700.4.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.62-150700.4.9.1.aarch64",
"product": {
"name": "apache2-prefork-2.4.62-150700.4.9.1.aarch64",
"product_id": "apache2-prefork-2.4.62-150700.4.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.62-150700.4.9.1.aarch64",
"product": {
"name": "apache2-utils-2.4.62-150700.4.9.1.aarch64",
"product_id": "apache2-utils-2.4.62-150700.4.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.62-150700.4.9.1.aarch64",
"product": {
"name": "apache2-worker-2.4.62-150700.4.9.1.aarch64",
"product_id": "apache2-worker-2.4.62-150700.4.9.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.62-150700.4.9.1.i586",
"product": {
"name": "apache2-2.4.62-150700.4.9.1.i586",
"product_id": "apache2-2.4.62-150700.4.9.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.62-150700.4.9.1.i586",
"product": {
"name": "apache2-devel-2.4.62-150700.4.9.1.i586",
"product_id": "apache2-devel-2.4.62-150700.4.9.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.62-150700.4.9.1.i586",
"product": {
"name": "apache2-event-2.4.62-150700.4.9.1.i586",
"product_id": "apache2-event-2.4.62-150700.4.9.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.62-150700.4.9.1.i586",
"product": {
"name": "apache2-prefork-2.4.62-150700.4.9.1.i586",
"product_id": "apache2-prefork-2.4.62-150700.4.9.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.62-150700.4.9.1.i586",
"product": {
"name": "apache2-utils-2.4.62-150700.4.9.1.i586",
"product_id": "apache2-utils-2.4.62-150700.4.9.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.62-150700.4.9.1.i586",
"product": {
"name": "apache2-worker-2.4.62-150700.4.9.1.i586",
"product_id": "apache2-worker-2.4.62-150700.4.9.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-manual-2.4.62-150700.4.9.1.noarch",
"product": {
"name": "apache2-manual-2.4.62-150700.4.9.1.noarch",
"product_id": "apache2-manual-2.4.62-150700.4.9.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.62-150700.4.9.1.ppc64le",
"product": {
"name": "apache2-2.4.62-150700.4.9.1.ppc64le",
"product_id": "apache2-2.4.62-150700.4.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.62-150700.4.9.1.ppc64le",
"product": {
"name": "apache2-devel-2.4.62-150700.4.9.1.ppc64le",
"product_id": "apache2-devel-2.4.62-150700.4.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.62-150700.4.9.1.ppc64le",
"product": {
"name": "apache2-event-2.4.62-150700.4.9.1.ppc64le",
"product_id": "apache2-event-2.4.62-150700.4.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.62-150700.4.9.1.ppc64le",
"product": {
"name": "apache2-prefork-2.4.62-150700.4.9.1.ppc64le",
"product_id": "apache2-prefork-2.4.62-150700.4.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.62-150700.4.9.1.ppc64le",
"product": {
"name": "apache2-utils-2.4.62-150700.4.9.1.ppc64le",
"product_id": "apache2-utils-2.4.62-150700.4.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.62-150700.4.9.1.ppc64le",
"product": {
"name": "apache2-worker-2.4.62-150700.4.9.1.ppc64le",
"product_id": "apache2-worker-2.4.62-150700.4.9.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.62-150700.4.9.1.s390x",
"product": {
"name": "apache2-2.4.62-150700.4.9.1.s390x",
"product_id": "apache2-2.4.62-150700.4.9.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.62-150700.4.9.1.s390x",
"product": {
"name": "apache2-devel-2.4.62-150700.4.9.1.s390x",
"product_id": "apache2-devel-2.4.62-150700.4.9.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.62-150700.4.9.1.s390x",
"product": {
"name": "apache2-event-2.4.62-150700.4.9.1.s390x",
"product_id": "apache2-event-2.4.62-150700.4.9.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.62-150700.4.9.1.s390x",
"product": {
"name": "apache2-prefork-2.4.62-150700.4.9.1.s390x",
"product_id": "apache2-prefork-2.4.62-150700.4.9.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.62-150700.4.9.1.s390x",
"product": {
"name": "apache2-utils-2.4.62-150700.4.9.1.s390x",
"product_id": "apache2-utils-2.4.62-150700.4.9.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.62-150700.4.9.1.s390x",
"product": {
"name": "apache2-worker-2.4.62-150700.4.9.1.s390x",
"product_id": "apache2-worker-2.4.62-150700.4.9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.62-150700.4.9.1.x86_64",
"product": {
"name": "apache2-2.4.62-150700.4.9.1.x86_64",
"product_id": "apache2-2.4.62-150700.4.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.62-150700.4.9.1.x86_64",
"product": {
"name": "apache2-devel-2.4.62-150700.4.9.1.x86_64",
"product_id": "apache2-devel-2.4.62-150700.4.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.62-150700.4.9.1.x86_64",
"product": {
"name": "apache2-event-2.4.62-150700.4.9.1.x86_64",
"product_id": "apache2-event-2.4.62-150700.4.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.62-150700.4.9.1.x86_64",
"product": {
"name": "apache2-prefork-2.4.62-150700.4.9.1.x86_64",
"product_id": "apache2-prefork-2.4.62-150700.4.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.62-150700.4.9.1.x86_64",
"product": {
"name": "apache2-utils-2.4.62-150700.4.9.1.x86_64",
"product_id": "apache2-utils-2.4.62-150700.4.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.62-150700.4.9.1.x86_64",
"product": {
"name": "apache2-worker-2.4.62-150700.4.9.1.x86_64",
"product_id": "apache2-worker-2.4.62-150700.4.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-server-applications:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.62-150700.4.9.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.aarch64"
},
"product_reference": "apache2-2.4.62-150700.4.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.62-150700.4.9.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.ppc64le"
},
"product_reference": "apache2-2.4.62-150700.4.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.62-150700.4.9.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.s390x"
},
"product_reference": "apache2-2.4.62-150700.4.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.62-150700.4.9.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.x86_64"
},
"product_reference": "apache2-2.4.62-150700.4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.62-150700.4.9.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.aarch64"
},
"product_reference": "apache2-prefork-2.4.62-150700.4.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.62-150700.4.9.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.62-150700.4.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.62-150700.4.9.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.s390x"
},
"product_reference": "apache2-prefork-2.4.62-150700.4.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.62-150700.4.9.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.62-150700.4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-event-2.4.62-150700.4.9.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.aarch64"
},
"product_reference": "apache2-event-2.4.62-150700.4.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-event-2.4.62-150700.4.9.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.ppc64le"
},
"product_reference": "apache2-event-2.4.62-150700.4.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-event-2.4.62-150700.4.9.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.s390x"
},
"product_reference": "apache2-event-2.4.62-150700.4.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-event-2.4.62-150700.4.9.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.x86_64"
},
"product_reference": "apache2-event-2.4.62-150700.4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.62-150700.4.9.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.aarch64"
},
"product_reference": "apache2-devel-2.4.62-150700.4.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.62-150700.4.9.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.ppc64le"
},
"product_reference": "apache2-devel-2.4.62-150700.4.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.62-150700.4.9.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.s390x"
},
"product_reference": "apache2-devel-2.4.62-150700.4.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.62-150700.4.9.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.x86_64"
},
"product_reference": "apache2-devel-2.4.62-150700.4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.62-150700.4.9.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.aarch64"
},
"product_reference": "apache2-utils-2.4.62-150700.4.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.62-150700.4.9.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.62-150700.4.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.62-150700.4.9.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.s390x"
},
"product_reference": "apache2-utils-2.4.62-150700.4.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.62-150700.4.9.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.x86_64"
},
"product_reference": "apache2-utils-2.4.62-150700.4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.62-150700.4.9.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.aarch64"
},
"product_reference": "apache2-worker-2.4.62-150700.4.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.62-150700.4.9.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.62-150700.4.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.62-150700.4.9.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.s390x"
},
"product_reference": "apache2-worker-2.4.62-150700.4.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.62-150700.4.9.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.x86_64"
},
"product_reference": "apache2-worker-2.4.62-150700.4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55753"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.\n\nThis issue affects Apache HTTP Server: from 2.4.30 before 2.4.66.\n\n\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55753",
"url": "https://www.suse.com/security/cve/CVE-2025-55753"
},
{
"category": "external",
"summary": "SUSE Bug 1254511 for CVE-2025-55753",
"url": "https://bugzilla.suse.com/1254511"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T19:07:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-55753"
},
{
"cve": "CVE-2025-58098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58098"
}
],
"notes": [
{
"category": "general",
"text": "Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd=\"...\" directives.\n\nThis issue affects Apache HTTP Server before 2.4.66.\n\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58098",
"url": "https://www.suse.com/security/cve/CVE-2025-58098"
},
{
"category": "external",
"summary": "SUSE Bug 1254512 for CVE-2025-58098",
"url": "https://bugzilla.suse.com/1254512"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T19:07:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-58098"
},
{
"cve": "CVE-2025-65082",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-65082"
}
],
"notes": [
{
"category": "general",
"text": "Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.\n\nThis issue affects Apache HTTP Server from 2.4.0 through 2.4.65.\n\nUsers are recommended to upgrade to version 2.4.66 which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-65082",
"url": "https://www.suse.com/security/cve/CVE-2025-65082"
},
{
"category": "external",
"summary": "SUSE Bug 1254514 for CVE-2025-65082",
"url": "https://bugzilla.suse.com/1254514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T19:07:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-65082"
},
{
"cve": "CVE-2025-66200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-66200"
}
],
"notes": [
{
"category": "general",
"text": "mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid.\n\nThis issue affects Apache HTTP Server: from 2.4.7 through 2.4.65.\n\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-66200",
"url": "https://www.suse.com/security/cve/CVE-2025-66200"
},
{
"category": "external",
"summary": "SUSE Bug 1254515 for CVE-2025-66200",
"url": "https://bugzilla.suse.com/1254515"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:apache2-prefork-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:apache2-event-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-devel-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-utils-2.4.62-150700.4.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:apache2-worker-2.4.62-150700.4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T19:07:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-66200"
}
]
}
SUSE-SU-2025:4488-1
Vulnerability from csaf_suse - Published: 2025-12-18 17:17 - Updated: 2025-12-18 17:17Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for apache2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for apache2 fixes the following issues:\n\n- CVE-2025-55753: Fixed mod_md (ACME) unintended retry intervals (bsc#1254511)\n- CVE-2025-65082: Fixed CGI environment variable override (bsc#1254514)\n- CVE-2025-58098: Fixed Server Side Includes adding query string to #exec cmd=... (bsc#1254512)\n- CVE-2025-66200: Fixed mod_userdir+suexec bypass via AllowOverride FileInfo (bsc#1254515)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4488,SUSE-SLE-SERVER-12-SP5-LTSS-2025-4488,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-4488",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4488-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4488-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254488-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4488-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023629.html"
},
{
"category": "self",
"summary": "SUSE Bug 1254511",
"url": "https://bugzilla.suse.com/1254511"
},
{
"category": "self",
"summary": "SUSE Bug 1254512",
"url": "https://bugzilla.suse.com/1254512"
},
{
"category": "self",
"summary": "SUSE Bug 1254514",
"url": "https://bugzilla.suse.com/1254514"
},
{
"category": "self",
"summary": "SUSE Bug 1254515",
"url": "https://bugzilla.suse.com/1254515"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55753 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-65082 page",
"url": "https://www.suse.com/security/cve/CVE-2025-65082/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-66200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-66200/"
}
],
"title": "Security update for apache2",
"tracking": {
"current_release_date": "2025-12-18T17:17:26Z",
"generator": {
"date": "2025-12-18T17:17:26Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4488-1",
"initial_release_date": "2025-12-18T17:17:26Z",
"revision_history": [
{
"date": "2025-12-18T17:17:26Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-35.75.1.aarch64",
"product": {
"name": "apache2-2.4.51-35.75.1.aarch64",
"product_id": "apache2-2.4.51-35.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-35.75.1.aarch64",
"product": {
"name": "apache2-devel-2.4.51-35.75.1.aarch64",
"product_id": "apache2-devel-2.4.51-35.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-35.75.1.aarch64",
"product": {
"name": "apache2-event-2.4.51-35.75.1.aarch64",
"product_id": "apache2-event-2.4.51-35.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-35.75.1.aarch64",
"product": {
"name": "apache2-example-pages-2.4.51-35.75.1.aarch64",
"product_id": "apache2-example-pages-2.4.51-35.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-35.75.1.aarch64",
"product": {
"name": "apache2-prefork-2.4.51-35.75.1.aarch64",
"product_id": "apache2-prefork-2.4.51-35.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-2.4.51-35.75.1.aarch64",
"product": {
"name": "apache2-tls13-2.4.51-35.75.1.aarch64",
"product_id": "apache2-tls13-2.4.51-35.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-devel-2.4.51-35.75.1.aarch64",
"product": {
"name": "apache2-tls13-devel-2.4.51-35.75.1.aarch64",
"product_id": "apache2-tls13-devel-2.4.51-35.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-event-2.4.51-35.75.1.aarch64",
"product": {
"name": "apache2-tls13-event-2.4.51-35.75.1.aarch64",
"product_id": "apache2-tls13-event-2.4.51-35.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.aarch64",
"product": {
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.aarch64",
"product_id": "apache2-tls13-example-pages-2.4.51-35.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-prefork-2.4.51-35.75.1.aarch64",
"product": {
"name": "apache2-tls13-prefork-2.4.51-35.75.1.aarch64",
"product_id": "apache2-tls13-prefork-2.4.51-35.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-utils-2.4.51-35.75.1.aarch64",
"product": {
"name": "apache2-tls13-utils-2.4.51-35.75.1.aarch64",
"product_id": "apache2-tls13-utils-2.4.51-35.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-worker-2.4.51-35.75.1.aarch64",
"product": {
"name": "apache2-tls13-worker-2.4.51-35.75.1.aarch64",
"product_id": "apache2-tls13-worker-2.4.51-35.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-35.75.1.aarch64",
"product": {
"name": "apache2-utils-2.4.51-35.75.1.aarch64",
"product_id": "apache2-utils-2.4.51-35.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-35.75.1.aarch64",
"product": {
"name": "apache2-worker-2.4.51-35.75.1.aarch64",
"product_id": "apache2-worker-2.4.51-35.75.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-35.75.1.i586",
"product": {
"name": "apache2-2.4.51-35.75.1.i586",
"product_id": "apache2-2.4.51-35.75.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-35.75.1.i586",
"product": {
"name": "apache2-devel-2.4.51-35.75.1.i586",
"product_id": "apache2-devel-2.4.51-35.75.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-35.75.1.i586",
"product": {
"name": "apache2-event-2.4.51-35.75.1.i586",
"product_id": "apache2-event-2.4.51-35.75.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-35.75.1.i586",
"product": {
"name": "apache2-example-pages-2.4.51-35.75.1.i586",
"product_id": "apache2-example-pages-2.4.51-35.75.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-35.75.1.i586",
"product": {
"name": "apache2-prefork-2.4.51-35.75.1.i586",
"product_id": "apache2-prefork-2.4.51-35.75.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-tls13-2.4.51-35.75.1.i586",
"product": {
"name": "apache2-tls13-2.4.51-35.75.1.i586",
"product_id": "apache2-tls13-2.4.51-35.75.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-tls13-devel-2.4.51-35.75.1.i586",
"product": {
"name": "apache2-tls13-devel-2.4.51-35.75.1.i586",
"product_id": "apache2-tls13-devel-2.4.51-35.75.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-tls13-event-2.4.51-35.75.1.i586",
"product": {
"name": "apache2-tls13-event-2.4.51-35.75.1.i586",
"product_id": "apache2-tls13-event-2.4.51-35.75.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.i586",
"product": {
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.i586",
"product_id": "apache2-tls13-example-pages-2.4.51-35.75.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-tls13-prefork-2.4.51-35.75.1.i586",
"product": {
"name": "apache2-tls13-prefork-2.4.51-35.75.1.i586",
"product_id": "apache2-tls13-prefork-2.4.51-35.75.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-tls13-utils-2.4.51-35.75.1.i586",
"product": {
"name": "apache2-tls13-utils-2.4.51-35.75.1.i586",
"product_id": "apache2-tls13-utils-2.4.51-35.75.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-tls13-worker-2.4.51-35.75.1.i586",
"product": {
"name": "apache2-tls13-worker-2.4.51-35.75.1.i586",
"product_id": "apache2-tls13-worker-2.4.51-35.75.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-35.75.1.i586",
"product": {
"name": "apache2-utils-2.4.51-35.75.1.i586",
"product_id": "apache2-utils-2.4.51-35.75.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-35.75.1.i586",
"product": {
"name": "apache2-worker-2.4.51-35.75.1.i586",
"product_id": "apache2-worker-2.4.51-35.75.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-doc-2.4.51-35.75.1.noarch",
"product": {
"name": "apache2-doc-2.4.51-35.75.1.noarch",
"product_id": "apache2-doc-2.4.51-35.75.1.noarch"
}
},
{
"category": "product_version",
"name": "apache2-tls13-doc-2.4.51-35.75.1.noarch",
"product": {
"name": "apache2-tls13-doc-2.4.51-35.75.1.noarch",
"product_id": "apache2-tls13-doc-2.4.51-35.75.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-35.75.1.ppc64le",
"product": {
"name": "apache2-2.4.51-35.75.1.ppc64le",
"product_id": "apache2-2.4.51-35.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-35.75.1.ppc64le",
"product": {
"name": "apache2-devel-2.4.51-35.75.1.ppc64le",
"product_id": "apache2-devel-2.4.51-35.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-35.75.1.ppc64le",
"product": {
"name": "apache2-event-2.4.51-35.75.1.ppc64le",
"product_id": "apache2-event-2.4.51-35.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-35.75.1.ppc64le",
"product": {
"name": "apache2-example-pages-2.4.51-35.75.1.ppc64le",
"product_id": "apache2-example-pages-2.4.51-35.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-35.75.1.ppc64le",
"product": {
"name": "apache2-prefork-2.4.51-35.75.1.ppc64le",
"product_id": "apache2-prefork-2.4.51-35.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-tls13-2.4.51-35.75.1.ppc64le",
"product": {
"name": "apache2-tls13-2.4.51-35.75.1.ppc64le",
"product_id": "apache2-tls13-2.4.51-35.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-tls13-devel-2.4.51-35.75.1.ppc64le",
"product": {
"name": "apache2-tls13-devel-2.4.51-35.75.1.ppc64le",
"product_id": "apache2-tls13-devel-2.4.51-35.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-tls13-event-2.4.51-35.75.1.ppc64le",
"product": {
"name": "apache2-tls13-event-2.4.51-35.75.1.ppc64le",
"product_id": "apache2-tls13-event-2.4.51-35.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le",
"product": {
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le",
"product_id": "apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-tls13-prefork-2.4.51-35.75.1.ppc64le",
"product": {
"name": "apache2-tls13-prefork-2.4.51-35.75.1.ppc64le",
"product_id": "apache2-tls13-prefork-2.4.51-35.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-tls13-utils-2.4.51-35.75.1.ppc64le",
"product": {
"name": "apache2-tls13-utils-2.4.51-35.75.1.ppc64le",
"product_id": "apache2-tls13-utils-2.4.51-35.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-tls13-worker-2.4.51-35.75.1.ppc64le",
"product": {
"name": "apache2-tls13-worker-2.4.51-35.75.1.ppc64le",
"product_id": "apache2-tls13-worker-2.4.51-35.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-35.75.1.ppc64le",
"product": {
"name": "apache2-utils-2.4.51-35.75.1.ppc64le",
"product_id": "apache2-utils-2.4.51-35.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-35.75.1.ppc64le",
"product": {
"name": "apache2-worker-2.4.51-35.75.1.ppc64le",
"product_id": "apache2-worker-2.4.51-35.75.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-35.75.1.s390",
"product": {
"name": "apache2-2.4.51-35.75.1.s390",
"product_id": "apache2-2.4.51-35.75.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-35.75.1.s390",
"product": {
"name": "apache2-devel-2.4.51-35.75.1.s390",
"product_id": "apache2-devel-2.4.51-35.75.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-35.75.1.s390",
"product": {
"name": "apache2-event-2.4.51-35.75.1.s390",
"product_id": "apache2-event-2.4.51-35.75.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-35.75.1.s390",
"product": {
"name": "apache2-example-pages-2.4.51-35.75.1.s390",
"product_id": "apache2-example-pages-2.4.51-35.75.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-35.75.1.s390",
"product": {
"name": "apache2-prefork-2.4.51-35.75.1.s390",
"product_id": "apache2-prefork-2.4.51-35.75.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-tls13-2.4.51-35.75.1.s390",
"product": {
"name": "apache2-tls13-2.4.51-35.75.1.s390",
"product_id": "apache2-tls13-2.4.51-35.75.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-tls13-devel-2.4.51-35.75.1.s390",
"product": {
"name": "apache2-tls13-devel-2.4.51-35.75.1.s390",
"product_id": "apache2-tls13-devel-2.4.51-35.75.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-tls13-event-2.4.51-35.75.1.s390",
"product": {
"name": "apache2-tls13-event-2.4.51-35.75.1.s390",
"product_id": "apache2-tls13-event-2.4.51-35.75.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.s390",
"product": {
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.s390",
"product_id": "apache2-tls13-example-pages-2.4.51-35.75.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-tls13-prefork-2.4.51-35.75.1.s390",
"product": {
"name": "apache2-tls13-prefork-2.4.51-35.75.1.s390",
"product_id": "apache2-tls13-prefork-2.4.51-35.75.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-tls13-utils-2.4.51-35.75.1.s390",
"product": {
"name": "apache2-tls13-utils-2.4.51-35.75.1.s390",
"product_id": "apache2-tls13-utils-2.4.51-35.75.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-tls13-worker-2.4.51-35.75.1.s390",
"product": {
"name": "apache2-tls13-worker-2.4.51-35.75.1.s390",
"product_id": "apache2-tls13-worker-2.4.51-35.75.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-35.75.1.s390",
"product": {
"name": "apache2-utils-2.4.51-35.75.1.s390",
"product_id": "apache2-utils-2.4.51-35.75.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-35.75.1.s390",
"product": {
"name": "apache2-worker-2.4.51-35.75.1.s390",
"product_id": "apache2-worker-2.4.51-35.75.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-35.75.1.s390x",
"product": {
"name": "apache2-2.4.51-35.75.1.s390x",
"product_id": "apache2-2.4.51-35.75.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-35.75.1.s390x",
"product": {
"name": "apache2-devel-2.4.51-35.75.1.s390x",
"product_id": "apache2-devel-2.4.51-35.75.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-35.75.1.s390x",
"product": {
"name": "apache2-event-2.4.51-35.75.1.s390x",
"product_id": "apache2-event-2.4.51-35.75.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-35.75.1.s390x",
"product": {
"name": "apache2-example-pages-2.4.51-35.75.1.s390x",
"product_id": "apache2-example-pages-2.4.51-35.75.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-35.75.1.s390x",
"product": {
"name": "apache2-prefork-2.4.51-35.75.1.s390x",
"product_id": "apache2-prefork-2.4.51-35.75.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-tls13-2.4.51-35.75.1.s390x",
"product": {
"name": "apache2-tls13-2.4.51-35.75.1.s390x",
"product_id": "apache2-tls13-2.4.51-35.75.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-tls13-devel-2.4.51-35.75.1.s390x",
"product": {
"name": "apache2-tls13-devel-2.4.51-35.75.1.s390x",
"product_id": "apache2-tls13-devel-2.4.51-35.75.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-tls13-event-2.4.51-35.75.1.s390x",
"product": {
"name": "apache2-tls13-event-2.4.51-35.75.1.s390x",
"product_id": "apache2-tls13-event-2.4.51-35.75.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.s390x",
"product": {
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.s390x",
"product_id": "apache2-tls13-example-pages-2.4.51-35.75.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-tls13-prefork-2.4.51-35.75.1.s390x",
"product": {
"name": "apache2-tls13-prefork-2.4.51-35.75.1.s390x",
"product_id": "apache2-tls13-prefork-2.4.51-35.75.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-tls13-utils-2.4.51-35.75.1.s390x",
"product": {
"name": "apache2-tls13-utils-2.4.51-35.75.1.s390x",
"product_id": "apache2-tls13-utils-2.4.51-35.75.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-tls13-worker-2.4.51-35.75.1.s390x",
"product": {
"name": "apache2-tls13-worker-2.4.51-35.75.1.s390x",
"product_id": "apache2-tls13-worker-2.4.51-35.75.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-35.75.1.s390x",
"product": {
"name": "apache2-utils-2.4.51-35.75.1.s390x",
"product_id": "apache2-utils-2.4.51-35.75.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-35.75.1.s390x",
"product": {
"name": "apache2-worker-2.4.51-35.75.1.s390x",
"product_id": "apache2-worker-2.4.51-35.75.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-35.75.1.x86_64",
"product": {
"name": "apache2-2.4.51-35.75.1.x86_64",
"product_id": "apache2-2.4.51-35.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-35.75.1.x86_64",
"product": {
"name": "apache2-devel-2.4.51-35.75.1.x86_64",
"product_id": "apache2-devel-2.4.51-35.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-35.75.1.x86_64",
"product": {
"name": "apache2-event-2.4.51-35.75.1.x86_64",
"product_id": "apache2-event-2.4.51-35.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-35.75.1.x86_64",
"product": {
"name": "apache2-example-pages-2.4.51-35.75.1.x86_64",
"product_id": "apache2-example-pages-2.4.51-35.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-35.75.1.x86_64",
"product": {
"name": "apache2-prefork-2.4.51-35.75.1.x86_64",
"product_id": "apache2-prefork-2.4.51-35.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-2.4.51-35.75.1.x86_64",
"product": {
"name": "apache2-tls13-2.4.51-35.75.1.x86_64",
"product_id": "apache2-tls13-2.4.51-35.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"product": {
"name": "apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"product_id": "apache2-tls13-devel-2.4.51-35.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-event-2.4.51-35.75.1.x86_64",
"product": {
"name": "apache2-tls13-event-2.4.51-35.75.1.x86_64",
"product_id": "apache2-tls13-event-2.4.51-35.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"product": {
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"product_id": "apache2-tls13-example-pages-2.4.51-35.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"product": {
"name": "apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"product_id": "apache2-tls13-prefork-2.4.51-35.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"product": {
"name": "apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"product_id": "apache2-tls13-utils-2.4.51-35.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"product": {
"name": "apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"product_id": "apache2-tls13-worker-2.4.51-35.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-35.75.1.x86_64",
"product": {
"name": "apache2-utils-2.4.51-35.75.1.x86_64",
"product_id": "apache2-utils-2.4.51-35.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-35.75.1.x86_64",
"product": {
"name": "apache2-worker-2.4.51-35.75.1.x86_64",
"product_id": "apache2-worker-2.4.51-35.75.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-35.75.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.aarch64"
},
"product_reference": "apache2-2.4.51-35.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-35.75.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.ppc64le"
},
"product_reference": "apache2-2.4.51-35.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-35.75.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.s390x"
},
"product_reference": "apache2-2.4.51-35.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-35.75.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.aarch64"
},
"product_reference": "apache2-devel-2.4.51-35.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-35.75.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.ppc64le"
},
"product_reference": "apache2-devel-2.4.51-35.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-35.75.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.s390x"
},
"product_reference": "apache2-devel-2.4.51-35.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-devel-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-35.75.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.75.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-35.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.51-35.75.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.aarch64"
},
"product_reference": "apache2-example-pages-2.4.51-35.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.51-35.75.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.ppc64le"
},
"product_reference": "apache2-example-pages-2.4.51-35.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.51-35.75.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.s390x"
},
"product_reference": "apache2-example-pages-2.4.51-35.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-example-pages-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-35.75.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.aarch64"
},
"product_reference": "apache2-prefork-2.4.51-35.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-35.75.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.51-35.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-35.75.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.s390x"
},
"product_reference": "apache2-prefork-2.4.51-35.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-2.4.51-35.75.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.aarch64"
},
"product_reference": "apache2-tls13-2.4.51-35.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-2.4.51-35.75.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.ppc64le"
},
"product_reference": "apache2-tls13-2.4.51-35.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-2.4.51-35.75.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.s390x"
},
"product_reference": "apache2-tls13-2.4.51-35.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-tls13-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-devel-2.4.51-35.75.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.aarch64"
},
"product_reference": "apache2-tls13-devel-2.4.51-35.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-devel-2.4.51-35.75.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.ppc64le"
},
"product_reference": "apache2-tls13-devel-2.4.51-35.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-devel-2.4.51-35.75.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.s390x"
},
"product_reference": "apache2-tls13-devel-2.4.51-35.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-devel-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-doc-2.4.51-35.75.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-doc-2.4.51-35.75.1.noarch"
},
"product_reference": "apache2-tls13-doc-2.4.51-35.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.aarch64"
},
"product_reference": "apache2-tls13-example-pages-2.4.51-35.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le"
},
"product_reference": "apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.s390x"
},
"product_reference": "apache2-tls13-example-pages-2.4.51-35.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-prefork-2.4.51-35.75.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.aarch64"
},
"product_reference": "apache2-tls13-prefork-2.4.51-35.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-prefork-2.4.51-35.75.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.ppc64le"
},
"product_reference": "apache2-tls13-prefork-2.4.51-35.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-prefork-2.4.51-35.75.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.s390x"
},
"product_reference": "apache2-tls13-prefork-2.4.51-35.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-prefork-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-utils-2.4.51-35.75.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.aarch64"
},
"product_reference": "apache2-tls13-utils-2.4.51-35.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-utils-2.4.51-35.75.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.ppc64le"
},
"product_reference": "apache2-tls13-utils-2.4.51-35.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-utils-2.4.51-35.75.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.s390x"
},
"product_reference": "apache2-tls13-utils-2.4.51-35.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-utils-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-worker-2.4.51-35.75.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.aarch64"
},
"product_reference": "apache2-tls13-worker-2.4.51-35.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-worker-2.4.51-35.75.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.ppc64le"
},
"product_reference": "apache2-tls13-worker-2.4.51-35.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-worker-2.4.51-35.75.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.s390x"
},
"product_reference": "apache2-tls13-worker-2.4.51-35.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-worker-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-35.75.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.aarch64"
},
"product_reference": "apache2-utils-2.4.51-35.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-35.75.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.51-35.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-35.75.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.s390x"
},
"product_reference": "apache2-utils-2.4.51-35.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-utils-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-35.75.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.aarch64"
},
"product_reference": "apache2-worker-2.4.51-35.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-35.75.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.51-35.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-35.75.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.s390x"
},
"product_reference": "apache2-worker-2.4.51-35.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-worker-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-devel-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-devel-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-35.75.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-doc-2.4.51-35.75.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-35.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-example-pages-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-example-pages-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-prefork-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-tls13-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-devel-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-devel-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-doc-2.4.51-35.75.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-doc-2.4.51-35.75.1.noarch"
},
"product_reference": "apache2-tls13-doc-2.4.51-35.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-prefork-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-prefork-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-utils-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-utils-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-worker-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-worker-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-utils-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-utils-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-worker-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-worker-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55753"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.\n\nThis issue affects Apache HTTP Server: from 2.4.30 before 2.4.66.\n\n\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-worker-2.4.51-35.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55753",
"url": "https://www.suse.com/security/cve/CVE-2025-55753"
},
{
"category": "external",
"summary": "SUSE Bug 1254511 for CVE-2025-55753",
"url": "https://bugzilla.suse.com/1254511"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-worker-2.4.51-35.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-worker-2.4.51-35.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-18T17:17:26Z",
"details": "moderate"
}
],
"title": "CVE-2025-55753"
},
{
"cve": "CVE-2025-58098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58098"
}
],
"notes": [
{
"category": "general",
"text": "Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd=\"...\" directives.\n\nThis issue affects Apache HTTP Server before 2.4.66.\n\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-worker-2.4.51-35.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58098",
"url": "https://www.suse.com/security/cve/CVE-2025-58098"
},
{
"category": "external",
"summary": "SUSE Bug 1254512 for CVE-2025-58098",
"url": "https://bugzilla.suse.com/1254512"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-worker-2.4.51-35.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-worker-2.4.51-35.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-18T17:17:26Z",
"details": "moderate"
}
],
"title": "CVE-2025-58098"
},
{
"cve": "CVE-2025-65082",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-65082"
}
],
"notes": [
{
"category": "general",
"text": "Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.\n\nThis issue affects Apache HTTP Server from 2.4.0 through 2.4.65.\n\nUsers are recommended to upgrade to version 2.4.66 which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-worker-2.4.51-35.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-65082",
"url": "https://www.suse.com/security/cve/CVE-2025-65082"
},
{
"category": "external",
"summary": "SUSE Bug 1254514 for CVE-2025-65082",
"url": "https://bugzilla.suse.com/1254514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-worker-2.4.51-35.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-worker-2.4.51-35.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-18T17:17:26Z",
"details": "moderate"
}
],
"title": "CVE-2025-65082"
},
{
"cve": "CVE-2025-66200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-66200"
}
],
"notes": [
{
"category": "general",
"text": "mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid.\n\nThis issue affects Apache HTTP Server: from 2.4.7 through 2.4.65.\n\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-worker-2.4.51-35.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-66200",
"url": "https://www.suse.com/security/cve/CVE-2025-66200"
},
{
"category": "external",
"summary": "SUSE Bug 1254515 for CVE-2025-66200",
"url": "https://bugzilla.suse.com/1254515"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-worker-2.4.51-35.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-worker-2.4.51-35.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-18T17:17:26Z",
"details": "moderate"
}
],
"title": "CVE-2025-66200"
}
]
}
WID-SEC-W-2025-2750
Vulnerability from csaf_certbund - Published: 2025-12-04 23:00 - Updated: 2026-01-19 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Apache ist ein Webserver f\u00fcr verschiedene Plattformen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Apache HTTP Server ausnutzen, um beliebigen Programmcode auszuf\u00fchren, um Informationen offenzulegen, und um Sicherheitsvorkehrungen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2750 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2750.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2750 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2750"
},
{
"category": "external",
"summary": "Apache HTTP Server 2.4 vulnerabilities vom 2025-12-04",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"category": "external",
"summary": "oss-sec mailing list CVE-2025-55753 vom 2025-12-04",
"url": "https://seclists.org/oss-sec/2025/q4/240"
},
{
"category": "external",
"summary": "oss-sec mailing list CVE-2025-58098 vom 2025-12-04",
"url": "https://seclists.org/oss-sec/2025/q4/241"
},
{
"category": "external",
"summary": "oss-sec mailing list CVE-2025-59775 vom 2025-12-04",
"url": "https://seclists.org/oss-sec/2025/q4/242"
},
{
"category": "external",
"summary": "oss-sec mailing list CVE-2025-65082 vom 2025-12-04",
"url": "https://seclists.org/oss-sec/2025/q4/243"
},
{
"category": "external",
"summary": "oss-sec mailing list CVE-2025-66200 vom 2025-12-04",
"url": "https://seclists.org/oss-sec/2025/q4/244"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-F46EFDFD9D vom 2025-12-05",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-f46efdfd9d"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-24BF1FFBE7 vom 2025-12-05",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-24bf1ffbe7"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-00A9A7C9B5 vom 2025-12-05",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-00a9a7c9b5"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-83D84EE7F2 vom 2025-12-08",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-83d84ee7f2"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-24282560E4 vom 2025-12-08",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-24282560e4"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-7B0D558AC5 vom 2025-12-08",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-7b0d558ac5"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2025-12-09",
"url": "https://msrc.microsoft.com/update-guide/"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7254766 vom 2025-12-15",
"url": "https://www.ibm.com/support/pages/node/7254766"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4488-1 vom 2025-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023629.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23732 vom 2025-12-22",
"url": "https://access.redhat.com/errata/RHSA-2025:23732"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23738 vom 2025-12-22",
"url": "https://access.redhat.com/errata/RHSA-2025:23738"
},
{
"category": "external",
"summary": "HCL Security Bulletin vom 2025-12-20",
"url": "https://support.hcl-software.com/community?id=community_blog\u0026sys_id=e990462f33fd7290159a05273e5c7b9c"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:23732 vom 2025-12-22",
"url": "https://errata.build.resf.org/RLSA-2025:23732"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-23738 vom 2025-12-22",
"url": "https://linux.oracle.com/errata/ELSA-2025-23738.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-23739 vom 2025-12-22",
"url": "https://linux.oracle.com/errata/ELSA-2025-23739.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-23919 vom 2025-12-23",
"url": "https://linux.oracle.com/errata/ELSA-2025-23919.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23932 vom 2025-12-22",
"url": "https://access.redhat.com/errata/RHSA-2025:23932"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23919 vom 2025-12-23",
"url": "https://access.redhat.com/errata/RHSA-2025:23919"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-23932 vom 2025-12-23",
"url": "https://linux.oracle.com/errata/ELSA-2025-23932.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:23919 vom 2025-12-23",
"url": "https://errata.build.resf.org/RLSA-2025:23919"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:23739 vom 2025-12-23",
"url": "https://errata.build.resf.org/RLSA-2025:23739"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:23738 vom 2025-12-24",
"url": "https://errata.build.resf.org/RLSA-2025:23738"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:23932 vom 2025-12-24",
"url": "https://errata.build.resf.org/RLSA-2025:23932"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4518-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023648.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-23732 vom 2025-12-26",
"url": "http://linux.oracle.com/errata/ELSA-2025-23732.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0011 vom 2026-01-05",
"url": "https://access.redhat.com/errata/RHSA-2026:0011"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0009 vom 2026-01-05",
"url": "https://access.redhat.com/errata/RHSA-2026:0009"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0010 vom 2026-01-05",
"url": "https://access.redhat.com/errata/RHSA-2026:0010"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0012 vom 2026-01-05",
"url": "https://access.redhat.com/errata/RHSA-2026:0012"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0029 vom 2026-01-05",
"url": "https://access.redhat.com/errata/RHSA-2026:0029"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0030 vom 2026-01-05",
"url": "https://access.redhat.com/errata/RHSA-2026:0030"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0075 vom 2026-01-06",
"url": "https://access.redhat.com/errata/RHSA-2026:0075"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0020-1 vom 2026-01-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023668.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0019-1 vom 2026-01-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023669.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3099 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3099.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0093 vom 2026-01-06",
"url": "https://access.redhat.com/errata/RHSA-2026:0093"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0074 vom 2026-01-05",
"url": "https://access.redhat.com/errata/RHSA-2026:0074"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0092 vom 2026-01-06",
"url": "https://access.redhat.com/errata/RHSA-2026:0092"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0095 vom 2026-01-06",
"url": "https://access.redhat.com/errata/RHSA-2026:0095"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0094 vom 2026-01-06",
"url": "https://access.redhat.com/errata/RHSA-2026:0094"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0090 vom 2026-01-06",
"url": "https://access.redhat.com/errata/RHSA-2026:0090"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0141 vom 2026-01-06",
"url": "https://access.redhat.com/errata/RHSA-2026:0141"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0171 vom 2026-01-06",
"url": "https://access.redhat.com/errata/RHSA-2026:0171"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0139 vom 2026-01-06",
"url": "https://access.redhat.com/errata/RHSA-2026:0139"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7256449 vom 2026-01-07",
"url": "https://www.ibm.com/support/pages/node/7256449"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0075 vom 2026-01-12",
"url": "https://linux.oracle.com/errata/ELSA-2026-0075.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20030-1 vom 2026-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6BK3U2XHMG7GTXYZNR5F5N4SEZTFIYH/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7968-1 vom 2026-01-19",
"url": "https://ubuntu.com/security/notices/USN-7968-1"
}
],
"source_lang": "en-US",
"title": "Apache HTTP Server: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-01-19T23:00:00.000+00:00",
"generator": {
"date": "2026-01-20T08:04:38.532+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2750",
"initial_release_date": "2025-12-04T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-12-04T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-12-07T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Fedora und European Union Vulnerability Database aufgenommen"
},
{
"date": "2025-12-08T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2025-12-09T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-12-15T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von IBM und IBM-APAR aufgenommen"
},
{
"date": "2025-12-18T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-21T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat und HCL aufgenommen"
},
{
"date": "2025-12-22T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2025-12-23T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Rocky Enterprise Software Foundation und SUSE aufgenommen"
},
{
"date": "2025-12-28T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-01-04T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-05T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat, SUSE und Amazon aufgenommen"
},
{
"date": "2026-01-06T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-07T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2026-01-12T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-01-15T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-01-19T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Ubuntu aufgenommen"
}
],
"status": "final",
"version": "17"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2.4.66",
"product": {
"name": "Apache HTTP Server \u003c2.4.66",
"product_id": "T049133"
}
},
{
"category": "product_version",
"name": "2.4.66",
"product": {
"name": "Apache HTTP Server 2.4.66",
"product_id": "T049133-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:apache:http_server:2.4.66"
}
}
}
],
"category": "product_name",
"name": "HTTP Server"
}
],
"category": "vendor",
"name": "Apache"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"category": "product_name",
"name": "HCL Commerce",
"product": {
"name": "HCL Commerce",
"product_id": "T019294",
"product_identification_helper": {
"cpe": "cpe:/a:hcltechsw:commerce:-"
}
}
}
],
"category": "vendor",
"name": "HCL"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "24.0.0",
"product": {
"name": "IBM Business Automation Workflow 24.0.0",
"product_id": "T036570",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:business_automation_workflow:24.0.0"
}
}
},
{
"category": "product_version",
"name": "24.0.1",
"product": {
"name": "IBM Business Automation Workflow 24.0.1",
"product_id": "T049760",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:business_automation_workflow:24.0.1"
}
}
},
{
"category": "product_version",
"name": "25.0.0",
"product": {
"name": "IBM Business Automation Workflow 25.0.0",
"product_id": "T049761",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:business_automation_workflow:25.0.0"
}
}
},
{
"category": "product_version",
"name": "25.0.1",
"product": {
"name": "IBM Business Automation Workflow 25.0.1",
"product_id": "T049762",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:business_automation_workflow:25.0.1"
}
}
}
],
"category": "product_name",
"name": "Business Automation Workflow"
},
{
"branches": [
{
"category": "product_version",
"name": "8.5",
"product": {
"name": "IBM HTTP Server 8.5",
"product_id": "T001650",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:http_server:8.5"
}
}
},
{
"category": "product_version",
"name": "9",
"product": {
"name": "IBM HTTP Server 9.0",
"product_id": "T008162",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:http_server:9.0"
}
}
}
],
"category": "product_name",
"name": "HTTP Server"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "azl3",
"product": {
"name": "Microsoft Azure Linux azl3",
"product_id": "T049210",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:azure_linux:azl3"
}
}
}
],
"category": "product_name",
"name": "Azure Linux"
}
],
"category": "vendor",
"name": "Microsoft"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55753",
"product_status": {
"known_affected": [
"67646",
"T019294",
"T004914",
"T032255",
"74185",
"T036570",
"T002207",
"T000126",
"T027843",
"T049762",
"398363",
"T049761",
"T001650",
"T008162",
"T049210",
"T049760",
"T049133"
]
},
"release_date": "2025-12-04T23:00:00.000+00:00",
"title": "CVE-2025-55753"
},
{
"cve": "CVE-2025-58098",
"product_status": {
"known_affected": [
"67646",
"T019294",
"T004914",
"T032255",
"74185",
"T036570",
"T002207",
"T000126",
"T027843",
"T049762",
"398363",
"T049761",
"T001650",
"T008162",
"T049210",
"T049760",
"T049133"
]
},
"release_date": "2025-12-04T23:00:00.000+00:00",
"title": "CVE-2025-58098"
},
{
"cve": "CVE-2025-59775",
"product_status": {
"known_affected": [
"67646",
"T019294",
"T004914",
"T032255",
"74185",
"T036570",
"T002207",
"T000126",
"T027843",
"T049762",
"398363",
"T049761",
"T001650",
"T008162",
"T049210",
"T049760",
"T049133"
]
},
"release_date": "2025-12-04T23:00:00.000+00:00",
"title": "CVE-2025-59775"
},
{
"cve": "CVE-2025-65082",
"product_status": {
"known_affected": [
"67646",
"T019294",
"T004914",
"T032255",
"74185",
"T036570",
"T002207",
"T000126",
"T027843",
"T049762",
"398363",
"T049761",
"T001650",
"T008162",
"T049210",
"T049760",
"T049133"
]
},
"release_date": "2025-12-04T23:00:00.000+00:00",
"title": "CVE-2025-65082"
},
{
"cve": "CVE-2025-66200",
"product_status": {
"known_affected": [
"67646",
"T019294",
"T004914",
"T032255",
"74185",
"T036570",
"T002207",
"T000126",
"T027843",
"T049762",
"398363",
"T049761",
"T001650",
"T008162",
"T049210",
"T049760",
"T049133"
]
},
"release_date": "2025-12-04T23:00:00.000+00:00",
"title": "CVE-2025-66200"
}
]
}
CERTFR-2025-AVI-1071
Vulnerability from certfr_avis - Published: 2025-12-05 - Updated: 2025-12-05
De multiples vulnérabilités ont été découvertes dans Apache HTTP Server. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une falsification de requêtes côté serveur (SSRF) et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apache | HTTP Server | Apache HTTP Server versions antérieures à 2.4.66 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Apache HTTP Server versions ant\u00e9rieures \u00e0 2.4.66",
"product": {
"name": "HTTP Server",
"vendor": {
"name": "Apache",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-59775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59775"
},
{
"name": "CVE-2025-55753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55753"
},
{
"name": "CVE-2025-66200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66200"
},
{
"name": "CVE-2025-65082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65082"
},
{
"name": "CVE-2025-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58098"
}
],
"initial_release_date": "2025-12-05T00:00:00",
"last_revision_date": "2025-12-05T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1071",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Apache HTTP Server. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF) et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apache HTTP Server",
"vendor_advisories": [
{
"published_at": "2025-12-04",
"title": "Bulletin de s\u00e9curit\u00e9 Apache HTTP Server CHANGES_2.4.66",
"url": "https://downloads.apache.org/httpd/CHANGES_2.4.66"
}
]
}
CERTFR-2025-AVI-1082
Vulnerability from certfr_avis - Published: 2025-12-09 - Updated: 2025-12-09
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | cbl2 cni-plugins 1.3.0-9 | ||
| Microsoft | N/A | cbl2 cf-cli 8.4.0-25 | ||
| Microsoft | N/A | cbl2 kube-vip-cloud-provider 0.0.2-23 | ||
| Microsoft | N/A | azl3 httpd 2.4.65-1 | ||
| Microsoft | N/A | azl3 cni-plugins 1.4.0-3 | ||
| Microsoft | N/A | azl3 kata-containers-cc 3.15.0.aks0-5 | ||
| Microsoft | N/A | cbl2 dcos-cli 1.2.0-22 | ||
| Microsoft | N/A | cbl2 jx 3.2.236-23 | ||
| Microsoft | N/A | cbl2 cert-manager 1.11.2-24 | ||
| Microsoft | N/A | azl3 dcos-cli 1.2.0-19 | ||
| Microsoft | N/A | azl3 kubernetes 1.30.10-16 | ||
| Microsoft | N/A | azl3 flannel 0.24.2-21 | ||
| Microsoft | N/A | azl3 kernel 6.6.112.1-2 | ||
| Microsoft | N/A | cbl2 influxdb 2.6.1-24 | ||
| Microsoft | N/A | cbl2 containerized-data-importer 1.55.0-26 | ||
| Microsoft | N/A | azl3 kernel 6.6.117.1-1 | ||
| Microsoft | N/A | cbl2 flannel 0.14.0-26 | ||
| Microsoft | N/A | cbl2 libcontainers-common 20210626-7 | ||
| Microsoft | N/A | cbl2 kata-containers-cc 3.2.0.azl2-8 | ||
| Microsoft | N/A | azl3 containerized-data-importer 1.57.0-17 | ||
| Microsoft | N/A | cbl2 kubevirt 0.59.0-31 | ||
| Microsoft | N/A | cbl2 moby-compose 2.17.3-12 | ||
| Microsoft | N/A | cbl2 cri-o 1.22.3-17 | ||
| Microsoft | N/A | cbl2 httpd 2.4.65-1 | ||
| Microsoft | N/A | azl3 kata-containers 3.19.1.kata2-2 | ||
| Microsoft | N/A | cbl2 kubernetes 1.28.4-19 | ||
| Microsoft | N/A | cbl2 moby-buildx 0.7.1-26 | ||
| Microsoft | N/A | cbl2 local-path-provisioner 0.0.21-19 | ||
| Microsoft | N/A | cbl2 prometheus 2.37.9-5 | ||
| Microsoft | N/A | azl3 influxdb 2.7.5-8 | ||
| Microsoft | N/A | cbl2 kata-containers 3.2.0.azl2-7 | ||
| Microsoft | N/A | azl3 libcontainers-common 20240213-3 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "cbl2 cni-plugins 1.3.0-9",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 cf-cli 8.4.0-25",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 kube-vip-cloud-provider 0.0.2-23",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 httpd 2.4.65-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 cni-plugins 1.4.0-3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kata-containers-cc 3.15.0.aks0-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 dcos-cli 1.2.0-22",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 jx 3.2.236-23",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 cert-manager 1.11.2-24",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 dcos-cli 1.2.0-19",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kubernetes 1.30.10-16",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 flannel 0.24.2-21",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kernel 6.6.112.1-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 influxdb 2.6.1-24",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 containerized-data-importer 1.55.0-26",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kernel 6.6.117.1-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 flannel 0.14.0-26",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 libcontainers-common 20210626-7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 kata-containers-cc 3.2.0.azl2-8",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 containerized-data-importer 1.57.0-17",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 kubevirt 0.59.0-31",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 moby-compose 2.17.3-12",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 cri-o 1.22.3-17",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 httpd 2.4.65-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kata-containers 3.19.1.kata2-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 kubernetes 1.28.4-19",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 moby-buildx 0.7.1-26",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 local-path-provisioner 0.0.21-19",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 prometheus 2.37.9-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 influxdb 2.7.5-8",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 kata-containers 3.2.0.azl2-7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 libcontainers-common 20240213-3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2025-59775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59775"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2025-40294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40294"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-66200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66200"
},
{
"name": "CVE-2025-65637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65637"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-65082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65082"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2023-53749",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53749"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
}
],
"initial_release_date": "2025-12-09T00:00:00",
"last_revision_date": "2025-12-09T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1082",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2025-12-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40275",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40275"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40319",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40319"
},
{
"published_at": "2025-12-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40280",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40280"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40304",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40304"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40301",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40301"
},
{
"published_at": "2025-12-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40272",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40272"
},
{
"published_at": "2025-12-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40269",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40269"
},
{
"published_at": "2025-12-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40277",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40277"
},
{
"published_at": "2025-12-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-65082",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-65082"
},
{
"published_at": "2025-12-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40284",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40284"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40292",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40292"
},
{
"published_at": "2025-12-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-65637",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-65637"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40294",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40294"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40297",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40297"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40311",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40311"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40303",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40303"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-53749",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53749"
},
{
"published_at": "2025-12-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-59775",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59775"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40310",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40310"
},
{
"published_at": "2025-12-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40281",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40281"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40308",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40308"
},
{
"published_at": "2025-12-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40283",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40283"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40323",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40323"
},
{
"published_at": "2025-12-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40279",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40279"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40305",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40305"
},
{
"published_at": "2025-12-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40288",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40288"
},
{
"published_at": "2025-12-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40273",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40273"
},
{
"published_at": "2025-12-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40268",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40268"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40324",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40324"
},
{
"published_at": "2025-12-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40289",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40289"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40322",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40322"
},
{
"published_at": "2025-12-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40282",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40282"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40321",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40321"
},
{
"published_at": "2025-12-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-66200",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66200"
},
{
"published_at": "2025-12-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40287",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40287"
}
]
}
CERTFR-2025-AVI-1082
Vulnerability from certfr_avis - Published: 2025-12-09 - Updated: 2025-12-09
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | cbl2 cni-plugins 1.3.0-9 | ||
| Microsoft | N/A | cbl2 cf-cli 8.4.0-25 | ||
| Microsoft | N/A | cbl2 kube-vip-cloud-provider 0.0.2-23 | ||
| Microsoft | N/A | azl3 httpd 2.4.65-1 | ||
| Microsoft | N/A | azl3 cni-plugins 1.4.0-3 | ||
| Microsoft | N/A | azl3 kata-containers-cc 3.15.0.aks0-5 | ||
| Microsoft | N/A | cbl2 dcos-cli 1.2.0-22 | ||
| Microsoft | N/A | cbl2 jx 3.2.236-23 | ||
| Microsoft | N/A | cbl2 cert-manager 1.11.2-24 | ||
| Microsoft | N/A | azl3 dcos-cli 1.2.0-19 | ||
| Microsoft | N/A | azl3 kubernetes 1.30.10-16 | ||
| Microsoft | N/A | azl3 flannel 0.24.2-21 | ||
| Microsoft | N/A | azl3 kernel 6.6.112.1-2 | ||
| Microsoft | N/A | cbl2 influxdb 2.6.1-24 | ||
| Microsoft | N/A | cbl2 containerized-data-importer 1.55.0-26 | ||
| Microsoft | N/A | azl3 kernel 6.6.117.1-1 | ||
| Microsoft | N/A | cbl2 flannel 0.14.0-26 | ||
| Microsoft | N/A | cbl2 libcontainers-common 20210626-7 | ||
| Microsoft | N/A | cbl2 kata-containers-cc 3.2.0.azl2-8 | ||
| Microsoft | N/A | azl3 containerized-data-importer 1.57.0-17 | ||
| Microsoft | N/A | cbl2 kubevirt 0.59.0-31 | ||
| Microsoft | N/A | cbl2 moby-compose 2.17.3-12 | ||
| Microsoft | N/A | cbl2 cri-o 1.22.3-17 | ||
| Microsoft | N/A | cbl2 httpd 2.4.65-1 | ||
| Microsoft | N/A | azl3 kata-containers 3.19.1.kata2-2 | ||
| Microsoft | N/A | cbl2 kubernetes 1.28.4-19 | ||
| Microsoft | N/A | cbl2 moby-buildx 0.7.1-26 | ||
| Microsoft | N/A | cbl2 local-path-provisioner 0.0.21-19 | ||
| Microsoft | N/A | cbl2 prometheus 2.37.9-5 | ||
| Microsoft | N/A | azl3 influxdb 2.7.5-8 | ||
| Microsoft | N/A | cbl2 kata-containers 3.2.0.azl2-7 | ||
| Microsoft | N/A | azl3 libcontainers-common 20240213-3 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "cbl2 cni-plugins 1.3.0-9",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 cf-cli 8.4.0-25",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 kube-vip-cloud-provider 0.0.2-23",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 httpd 2.4.65-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 cni-plugins 1.4.0-3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kata-containers-cc 3.15.0.aks0-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 dcos-cli 1.2.0-22",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 jx 3.2.236-23",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 cert-manager 1.11.2-24",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 dcos-cli 1.2.0-19",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kubernetes 1.30.10-16",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 flannel 0.24.2-21",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kernel 6.6.112.1-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 influxdb 2.6.1-24",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 containerized-data-importer 1.55.0-26",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kernel 6.6.117.1-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 flannel 0.14.0-26",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 libcontainers-common 20210626-7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 kata-containers-cc 3.2.0.azl2-8",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 containerized-data-importer 1.57.0-17",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 kubevirt 0.59.0-31",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 moby-compose 2.17.3-12",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 cri-o 1.22.3-17",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 httpd 2.4.65-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kata-containers 3.19.1.kata2-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 kubernetes 1.28.4-19",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 moby-buildx 0.7.1-26",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 local-path-provisioner 0.0.21-19",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 prometheus 2.37.9-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 influxdb 2.7.5-8",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 kata-containers 3.2.0.azl2-7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 libcontainers-common 20240213-3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2025-59775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59775"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2025-40294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40294"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-66200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66200"
},
{
"name": "CVE-2025-65637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65637"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-65082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65082"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2023-53749",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53749"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
}
],
"initial_release_date": "2025-12-09T00:00:00",
"last_revision_date": "2025-12-09T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1082",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2025-12-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40275",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40275"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40319",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40319"
},
{
"published_at": "2025-12-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40280",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40280"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40304",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40304"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40301",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40301"
},
{
"published_at": "2025-12-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40272",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40272"
},
{
"published_at": "2025-12-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40269",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40269"
},
{
"published_at": "2025-12-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40277",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40277"
},
{
"published_at": "2025-12-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-65082",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-65082"
},
{
"published_at": "2025-12-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40284",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40284"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40292",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40292"
},
{
"published_at": "2025-12-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-65637",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-65637"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40294",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40294"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40297",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40297"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40311",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40311"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40303",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40303"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-53749",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53749"
},
{
"published_at": "2025-12-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-59775",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59775"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40310",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40310"
},
{
"published_at": "2025-12-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40281",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40281"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40308",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40308"
},
{
"published_at": "2025-12-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40283",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40283"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40323",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40323"
},
{
"published_at": "2025-12-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40279",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40279"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40305",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40305"
},
{
"published_at": "2025-12-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40288",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40288"
},
{
"published_at": "2025-12-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40273",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40273"
},
{
"published_at": "2025-12-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40268",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40268"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40324",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40324"
},
{
"published_at": "2025-12-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40289",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40289"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40322",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40322"
},
{
"published_at": "2025-12-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40282",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40282"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40321",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40321"
},
{
"published_at": "2025-12-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-66200",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66200"
},
{
"published_at": "2025-12-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40287",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40287"
}
]
}
CERTFR-2025-AVI-1071
Vulnerability from certfr_avis - Published: 2025-12-05 - Updated: 2025-12-05
De multiples vulnérabilités ont été découvertes dans Apache HTTP Server. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une falsification de requêtes côté serveur (SSRF) et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apache | HTTP Server | Apache HTTP Server versions antérieures à 2.4.66 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Apache HTTP Server versions ant\u00e9rieures \u00e0 2.4.66",
"product": {
"name": "HTTP Server",
"vendor": {
"name": "Apache",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-59775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59775"
},
{
"name": "CVE-2025-55753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55753"
},
{
"name": "CVE-2025-66200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66200"
},
{
"name": "CVE-2025-65082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65082"
},
{
"name": "CVE-2025-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58098"
}
],
"initial_release_date": "2025-12-05T00:00:00",
"last_revision_date": "2025-12-05T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1071",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Apache HTTP Server. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF) et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apache HTTP Server",
"vendor_advisories": [
{
"published_at": "2025-12-04",
"title": "Bulletin de s\u00e9curit\u00e9 Apache HTTP Server CHANGES_2.4.66",
"url": "https://downloads.apache.org/httpd/CHANGES_2.4.66"
}
]
}
FKIE_CVE-2025-65082
Vulnerability from fkie_nvd - Published: 2025-12-05 11:15 - Updated: 2025-12-10 16:39| URL | Tags | ||
|---|---|---|---|
| security@apache.org | https://httpd.apache.org/security/vulnerabilities_24.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/12/04/7 | Issue Tracking, Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| apache | http_server | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2E190AC9-8786-444C-877C-DE4BC272331F",
"versionEndExcluding": "2.4.66",
"versionStartIncluding": "2.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.\n\nThis issue affects Apache HTTP Server from 2.4.0 through 2.4.65.\n\nUsers are recommended to upgrade to version 2.4.66 which fixes the issue."
}
],
"id": "CVE-2025-65082",
"lastModified": "2025-12-10T16:39:56.450",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-12-05T11:15:52.497",
"references": [
{
"source": "security@apache.org",
"tags": [
"Vendor Advisory"
],
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2025/12/04/7"
}
],
"sourceIdentifier": "security@apache.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-150"
}
],
"source": "security@apache.org",
"type": "Secondary"
}
]
}
MSRC_CVE-2025-65082
Vulnerability from csaf_microsoft - Published: 2025-12-02 00:00 - Updated: 2025-12-20 14:35Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-65082 Apache HTTP Server: CGI environment variable override - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-65082.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Apache HTTP Server: CGI environment variable override",
"tracking": {
"current_release_date": "2025-12-20T14:35:39.000Z",
"generator": {
"date": "2025-12-20T20:06:58.263Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-65082",
"initial_release_date": "2025-12-02T00:00:00.000Z",
"revision_history": [
{
"date": "2025-12-07T01:03:30.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2025-12-08T14:37:36.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
},
{
"date": "2025-12-17T14:37:18.000Z",
"legacy_version": "3",
"number": "3",
"summary": "Information published."
},
{
"date": "2025-12-20T14:35:39.000Z",
"legacy_version": "4",
"number": "4",
"summary": "Information published."
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 httpd 2.4.65-1",
"product": {
"name": "\u003cazl3 httpd 2.4.65-1",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 httpd 2.4.65-1",
"product": {
"name": "azl3 httpd 2.4.65-1",
"product_id": "19625"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 httpd 2.4.65-1",
"product": {
"name": "\u003ccbl2 httpd 2.4.65-1",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cbl2 httpd 2.4.65-1",
"product": {
"name": "cbl2 httpd 2.4.65-1",
"product_id": "19577"
}
}
],
"category": "product_name",
"name": "httpd"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 httpd 2.4.65-1 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 httpd 2.4.65-1 as a component of Azure Linux 3.0",
"product_id": "19625-17084"
},
"product_reference": "19625",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 httpd 2.4.65-1 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 httpd 2.4.65-1 as a component of CBL Mariner 2.0",
"product_id": "19577-17086"
},
"product_reference": "19577",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-65082",
"cwe": {
"id": "CWE-150",
"name": "Improper Neutralization of Escape, Meta, or Control Sequences"
},
"notes": [
{
"category": "general",
"text": "apache",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"19625-17084",
"19577-17086"
],
"known_affected": [
"17084-1",
"17086-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-65082 Apache HTTP Server: CGI environment variable override - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-65082.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-07T01:03:30.000Z",
"details": "2.4.66-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-1",
"17086-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalsScore": 0.0,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 6.5,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"17084-1",
"17086-2"
]
}
],
"title": "Apache HTTP Server: CGI environment variable override"
}
]
}
GHSA-768G-4QPG-32W7
Vulnerability from github – Published: 2025-12-05 12:30 – Updated: 2025-12-05 21:30Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.
This issue affects Apache HTTP Server from 2.4.0 through 2.4.65.
Users are recommended to upgrade to version 2.4.66 which fixes the issue.
{
"affected": [],
"aliases": [
"CVE-2025-65082"
],
"database_specific": {
"cwe_ids": [
"CWE-150"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-12-05T11:15:52Z",
"severity": "MODERATE"
},
"details": "Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.\n\nThis issue affects Apache HTTP Server from 2.4.0 through 2.4.65.\n\nUsers are recommended to upgrade to version 2.4.66 which fixes the issue.",
"id": "GHSA-768g-4qpg-32w7",
"modified": "2025-12-05T21:30:23Z",
"published": "2025-12-05T12:30:13Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-65082"
},
{
"type": "WEB",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2025/12/04/7"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"type": "CVSS_V3"
}
]
}
CNVD-2025-30833
Vulnerability from cnvd - Published: 2025-12-17厂商已发布了漏洞修复程序,请及时关注更新: https://httpd.apache.org/download.cgi
| Name | Apache HTTP Server >=2.4.0,<=2.4.65 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2025-65082",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2025-65082"
}
},
"description": "Apache HTTP Server\u662f\u7f8e\u56fd\u963f\u5e15\u5947\uff08Apache\uff09\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u5f00\u6e90\u7f51\u9875\u670d\u52a1\u5668\u3002\u8be5\u670d\u52a1\u5668\u5177\u6709\u5feb\u901f\u3001\u53ef\u9760\u4e14\u53ef\u901a\u8fc7\u7b80\u5355\u7684API\u8fdb\u884c\u6269\u5145\u7684\u7279\u70b9\u3002\n\nApache HTTP Server 2.4.0\u7248\u672c\u81f32.4.65\u7248\u672c\u5b58\u5728\u5b89\u5168\u7ed5\u8fc7\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u662f\u7531\u4e8e\u5bf9\u8f6c\u4e49\u3001\u5143\u6216\u63a7\u5236\u5e8f\u5217\u7684\u4e0d\u6b63\u786e\u4e2d\u548c\u9020\u6210\u7684\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4CGI\u7a0b\u5e8f\u53d8\u91cf\u88ab\u610f\u5916\u8986\u76d6\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://httpd.apache.org/download.cgi",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2025-30833",
"openTime": "2025-12-17",
"patchDescription": "Apache HTTP Server\u662f\u7f8e\u56fd\u963f\u5e15\u5947\uff08Apache\uff09\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u5f00\u6e90\u7f51\u9875\u670d\u52a1\u5668\u3002\u8be5\u670d\u52a1\u5668\u5177\u6709\u5feb\u901f\u3001\u53ef\u9760\u4e14\u53ef\u901a\u8fc7\u7b80\u5355\u7684API\u8fdb\u884c\u6269\u5145\u7684\u7279\u70b9\u3002\r\n\r\nApache HTTP Server 2.4.0\u7248\u672c\u81f32.4.65\u7248\u672c\u5b58\u5728\u5b89\u5168\u7ed5\u8fc7\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u662f\u7531\u4e8e\u5bf9\u8f6c\u4e49\u3001\u5143\u6216\u63a7\u5236\u5e8f\u5217\u7684\u4e0d\u6b63\u786e\u4e2d\u548c\u9020\u6210\u7684\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4CGI\u7a0b\u5e8f\u53d8\u91cf\u88ab\u610f\u5916\u8986\u76d6\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Apache HTTP Server\u5b89\u5168\u7ed5\u8fc7\u6f0f\u6d1e\uff08CNVD-2025-30833\uff09\u7684\u8865\u4e01",
"products": {
"product": "Apache HTTP Server \u003e=2.4.0\uff0c\u003c=2.4.65"
},
"referenceLink": "http://www.openwall.com/lists/oss-security/2025/12/04/7",
"serverity": "\u4e2d",
"submitTime": "2025-12-10",
"title": "Apache HTTP Server\u5b89\u5168\u7ed5\u8fc7\u6f0f\u6d1e\uff08CNVD-2025-30833\uff09"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.