Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-7659 (GCVE-0-2017-7659)
Vulnerability from cvelistv5
Published
2017-07-26 21:00
Modified
2024-08-05 16:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
A maliciously constructed HTTP/2 request could cause mod_http2 in Apache HTTP Server 2.4.24, 2.4.25 to dereference a NULL pointer and crash the server process.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache HTTP Server |
Version: 2.4.24, 2.4.25 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:12:27.873Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT208221" }, { "name": "RHSA-2017:2483", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2483" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180601-0002/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us" }, { "name": "[announce@httpd.apache.org] 20170619 [SECURITY] CVE-2017-7659: mod_http2 null pointer dereference", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/1d0b746bbaa3a64890fcdab59ee9050aaa633b7143e7d412374e5a9a%40%3Cannounce.httpd.apache.org%3E" }, { "name": "99132", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99132" }, { "name": "DSA-3896", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2017/dsa-3896" }, { "name": "1038711", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038711" }, { "name": "GLSA-201710-32", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201710-32" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.tenable.com/security/tns-2019-09" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210603 svn commit: r1075360 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache HTTP Server", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "2.4.24, 2.4.25" } ] } ], "datePublic": "2017-06-19T00:00:00", "descriptions": [ { "lang": "en", "value": "A maliciously constructed HTTP/2 request could cause mod_http2 in Apache HTTP Server 2.4.24, 2.4.25 to dereference a NULL pointer and crash the server process." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-06T10:10:57", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT208221" }, { "name": "RHSA-2017:2483", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2483" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180601-0002/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us" }, { "name": "[announce@httpd.apache.org] 20170619 [SECURITY] CVE-2017-7659: mod_http2 null pointer dereference", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/1d0b746bbaa3a64890fcdab59ee9050aaa633b7143e7d412374e5a9a%40%3Cannounce.httpd.apache.org%3E" }, { "name": "99132", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99132" }, { "name": "DSA-3896", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2017/dsa-3896" }, { "name": "1038711", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038711" }, { "name": "GLSA-201710-32", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201710-32" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.tenable.com/security/tns-2019-09" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210603 svn commit: r1075360 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2017-7659", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache HTTP Server", "version": { "version_data": [ { "version_value": "2.4.24, 2.4.25" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A maliciously constructed HTTP/2 request could cause mod_http2 in Apache HTTP Server 2.4.24, 2.4.25 to dereference a NULL pointer and crash the server process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/HT208221", "refsource": "CONFIRM", "url": "https://support.apple.com/HT208221" }, { "name": "RHSA-2017:2483", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2483" }, { "name": "https://security.netapp.com/advisory/ntap-20180601-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180601-0002/" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us" }, { "name": "[announce@httpd.apache.org] 20170619 [SECURITY] CVE-2017-7659: mod_http2 null pointer dereference", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/1d0b746bbaa3a64890fcdab59ee9050aaa633b7143e7d412374e5a9a@%3Cannounce.httpd.apache.org%3E" }, { "name": "99132", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99132" }, { "name": "DSA-3896", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3896" }, { "name": "1038711", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038711" }, { "name": "GLSA-201710-32", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201710-32" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E" }, { "name": "https://www.tenable.com/security/tns-2019-09", "refsource": "CONFIRM", "url": "https://www.tenable.com/security/tns-2019-09" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210603 svn commit: r1075360 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2017-7659", "datePublished": "2017-07-26T21:00:00", "dateReserved": "2017-04-11T00:00:00", "dateUpdated": "2024-08-05T16:12:27.873Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2017-7659\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2017-07-26T21:29:00.237\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A maliciously constructed HTTP/2 request could cause mod_http2 in Apache HTTP Server 2.4.24, 2.4.25 to dereference a NULL pointer and crash the server process.\"},{\"lang\":\"es\",\"value\":\"Una petici\u00f3n HTTP/2 construida de manera maliciosa podr\u00eda causar que mod_http2 en el Servidor HTTP de Apache versiones 2.4.24, 2.4.25, desreferencie al puntero NULL y bloquee el procesamiento del servidor.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.4.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD2AC773-59A1-46EB-8943-309ADF012435\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.4.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB5673AB-53BB-40B2-83A7-8B82B2D0EBB8\"}]}]}],\"references\":[{\"url\":\"http://www.debian.org/security/2017/dsa-3896\",\"source\":\"security@apache.org\"},{\"url\":\"http://www.securityfocus.com/bid/99132\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1038711\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2483\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/1d0b746bbaa3a64890fcdab59ee9050aaa633b7143e7d412374e5a9a%40%3Cannounce.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://security.gentoo.org/glsa/201710-32\",\"source\":\"security@apache.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20180601-0002/\",\"source\":\"security@apache.org\"},{\"url\":\"https://support.apple.com/HT208221\",\"source\":\"security@apache.org\"},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us\",\"source\":\"security@apache.org\"},{\"url\":\"https://www.tenable.com/security/tns-2019-09\",\"source\":\"security@apache.org\"},{\"url\":\"http://www.debian.org/security/2017/dsa-3896\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/99132\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1038711\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2483\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/1d0b746bbaa3a64890fcdab59ee9050aaa633b7143e7d412374e5a9a%40%3Cannounce.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201710-32\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20180601-0002/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.apple.com/HT208221\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.tenable.com/security/tns-2019-09\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
fkie_cve-2017-7659
Vulnerability from fkie_nvd
Published
2017-07-26 21:29
Modified
2025-04-20 01:37
Severity ?
Summary
A maliciously constructed HTTP/2 request could cause mod_http2 in Apache HTTP Server 2.4.24, 2.4.25 to dereference a NULL pointer and crash the server process.
References
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | http://www.debian.org/security/2017/dsa-3896 | ||
security@apache.org | http://www.securityfocus.com/bid/99132 | Third Party Advisory, VDB Entry | |
security@apache.org | http://www.securitytracker.com/id/1038711 | Third Party Advisory, VDB Entry | |
security@apache.org | https://access.redhat.com/errata/RHSA-2017:2483 | ||
security@apache.org | https://lists.apache.org/thread.html/1d0b746bbaa3a64890fcdab59ee9050aaa633b7143e7d412374e5a9a%40%3Cannounce.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://security.gentoo.org/glsa/201710-32 | ||
security@apache.org | https://security.netapp.com/advisory/ntap-20180601-0002/ | ||
security@apache.org | https://support.apple.com/HT208221 | ||
security@apache.org | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us | ||
security@apache.org | https://www.tenable.com/security/tns-2019-09 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2017/dsa-3896 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/99132 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1038711 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:2483 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/1d0b746bbaa3a64890fcdab59ee9050aaa633b7143e7d412374e5a9a%40%3Cannounce.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201710-32 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20180601-0002/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/HT208221 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.tenable.com/security/tns-2019-09 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | http_server | 2.4.24 | |
apache | http_server | 2.4.25 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:http_server:2.4.24:*:*:*:*:*:*:*", "matchCriteriaId": "AD2AC773-59A1-46EB-8943-309ADF012435", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:http_server:2.4.25:*:*:*:*:*:*:*", "matchCriteriaId": "FB5673AB-53BB-40B2-83A7-8B82B2D0EBB8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously constructed HTTP/2 request could cause mod_http2 in Apache HTTP Server 2.4.24, 2.4.25 to dereference a NULL pointer and crash the server process." }, { "lang": "es", "value": "Una petici\u00f3n HTTP/2 construida de manera maliciosa podr\u00eda causar que mod_http2 en el Servidor HTTP de Apache versiones 2.4.24, 2.4.25, desreferencie al puntero NULL y bloquee el procesamiento del servidor." } ], "id": "CVE-2017-7659", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-07-26T21:29:00.237", "references": [ { "source": "security@apache.org", "url": "http://www.debian.org/security/2017/dsa-3896" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/99132" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038711" }, { "source": "security@apache.org", "url": "https://access.redhat.com/errata/RHSA-2017:2483" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/1d0b746bbaa3a64890fcdab59ee9050aaa633b7143e7d412374e5a9a%40%3Cannounce.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://security.gentoo.org/glsa/201710-32" }, { "source": "security@apache.org", "url": "https://security.netapp.com/advisory/ntap-20180601-0002/" }, { "source": "security@apache.org", "url": "https://support.apple.com/HT208221" }, { "source": "security@apache.org", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us" }, { "source": "security@apache.org", "url": "https://www.tenable.com/security/tns-2019-09" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2017/dsa-3896" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/99132" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038711" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2017:2483" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/1d0b746bbaa3a64890fcdab59ee9050aaa633b7143e7d412374e5a9a%40%3Cannounce.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201710-32" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20180601-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.apple.com/HT208221" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.tenable.com/security/tns-2019-09" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-64wg-r59g-c9jm
Vulnerability from github
Published
2022-05-13 01:09
Modified
2025-04-20 03:41
Severity ?
VLAI Severity ?
Details
A maliciously constructed HTTP/2 request could cause mod_http2 in Apache HTTP Server 2.4.24, 2.4.25 to dereference a NULL pointer and crash the server process.
{ "affected": [], "aliases": [ "CVE-2017-7659" ], "database_specific": { "cwe_ids": [ "CWE-476" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-07-26T21:29:00Z", "severity": "HIGH" }, "details": "A maliciously constructed HTTP/2 request could cause mod_http2 in Apache HTTP Server 2.4.24, 2.4.25 to dereference a NULL pointer and crash the server process.", "id": "GHSA-64wg-r59g-c9jm", "modified": "2025-04-20T03:41:29Z", "published": "2022-05-13T01:09:41Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7659" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:2483" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201710-32" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20180601-0002" }, { "type": "WEB", "url": "https://support.apple.com/HT208221" }, { "type": "WEB", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us" }, { "type": "WEB", "url": "https://www.tenable.com/security/tns-2019-09" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/1d0b746bbaa3a64890fcdab59ee9050aaa633b7143e7d412374e5a9a%40%3Cannounce.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/1d0b746bbaa3a64890fcdab59ee9050aaa633b7143e7d412374e5a9a@%3Cannounce.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "http://www.debian.org/security/2017/dsa-3896" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/99132" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1038711" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
gsd-2017-7659
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
A maliciously constructed HTTP/2 request could cause mod_http2 in Apache HTTP Server 2.4.24, 2.4.25 to dereference a NULL pointer and crash the server process.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2017-7659", "description": "A maliciously constructed HTTP/2 request could cause mod_http2 in Apache HTTP Server 2.4.24, 2.4.25 to dereference a NULL pointer and crash the server process.", "id": "GSD-2017-7659", "references": [ "https://www.suse.com/security/cve/CVE-2017-7659.html", "https://www.debian.org/security/2017/dsa-3896", "https://access.redhat.com/errata/RHSA-2017:2483", "https://security.archlinux.org/CVE-2017-7659", "https://alas.aws.amazon.com/cve/html/CVE-2017-7659.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-7659" ], "details": "A maliciously constructed HTTP/2 request could cause mod_http2 in Apache HTTP Server 2.4.24, 2.4.25 to dereference a NULL pointer and crash the server process.", "id": "GSD-2017-7659", "modified": "2023-12-13T01:21:06.523189Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2017-7659", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache HTTP Server", "version": { "version_data": [ { "version_value": "2.4.24, 2.4.25" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A maliciously constructed HTTP/2 request could cause mod_http2 in Apache HTTP Server 2.4.24, 2.4.25 to dereference a NULL pointer and crash the server process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/HT208221", "refsource": "CONFIRM", "url": "https://support.apple.com/HT208221" }, { "name": "RHSA-2017:2483", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2483" }, { "name": "https://security.netapp.com/advisory/ntap-20180601-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180601-0002/" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us" }, { "name": "[announce@httpd.apache.org] 20170619 [SECURITY] CVE-2017-7659: mod_http2 null pointer dereference", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/1d0b746bbaa3a64890fcdab59ee9050aaa633b7143e7d412374e5a9a@%3Cannounce.httpd.apache.org%3E" }, { "name": "99132", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99132" }, { "name": "DSA-3896", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3896" }, { "name": "1038711", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038711" }, { "name": "GLSA-201710-32", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201710-32" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E" }, { "name": "https://www.tenable.com/security/tns-2019-09", "refsource": "CONFIRM", "url": "https://www.tenable.com/security/tns-2019-09" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210603 svn commit: r1075360 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2017-7659" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A maliciously constructed HTTP/2 request could cause mod_http2 in Apache HTTP Server 2.4.24, 2.4.25 to dereference a NULL pointer and crash the server process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-476" } ] } ] }, "references": { "reference_data": [ { "name": "[announce@httpd.apache.org] 20170619 [SECURITY] CVE-2017-7659: mod_http2 null pointer dereference", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/1d0b746bbaa3a64890fcdab59ee9050aaa633b7143e7d412374e5a9a@%3Cannounce.httpd.apache.org%3E" }, { "name": "1038711", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038711" }, { "name": "99132", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/99132" }, { "name": "GLSA-201710-32", "refsource": "GENTOO", "tags": [], "url": "https://security.gentoo.org/glsa/201710-32" }, { "name": "DSA-3896", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2017/dsa-3896" }, { "name": "https://support.apple.com/HT208221", "refsource": "CONFIRM", "tags": [], "url": "https://support.apple.com/HT208221" }, { "name": "RHSA-2017:2483", "refsource": "REDHAT", "tags": [], "url": "https://access.redhat.com/errata/RHSA-2017:2483" }, { "name": "https://security.netapp.com/advisory/ntap-20180601-0002/", "refsource": "CONFIRM", "tags": [], "url": "https://security.netapp.com/advisory/ntap-20180601-0002/" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us", "refsource": "CONFIRM", "tags": [], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E" }, { "name": "https://www.tenable.com/security/tns-2019-09", "refsource": "CONFIRM", "tags": [], "url": "https://www.tenable.com/security/tns-2019-09" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210603 svn commit: r1075360 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2021-06-06T11:15Z", "publishedDate": "2017-07-26T21:29Z" } } }
rhsa-2017:2483
Vulnerability from csaf_redhat
Published
2017-08-16 23:04
Modified
2025-08-03 17:29
Summary
Red Hat Security Advisory: httpd24-httpd security update
Notes
Topic
An update for httpd24-httpd is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* It was discovered that the httpd's mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)
* It was discovered that the use of httpd's ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)
* A NULL pointer dereference flaw was found in the httpd's mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)
* A NULL pointer dereference flaw was found in the mod_http2 module of httpd. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP/2 request. (CVE-2017-7659)
* A buffer over-read flaw was found in the httpd's ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request. (CVE-2017-7668)
* A buffer over-read flaw was found in the httpd's mod_mime module. A user permitted to modify httpd's MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd24-httpd is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)\n\n* A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)\n\n* A NULL pointer dereference flaw was found in the mod_http2 module of httpd. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP/2 request. (CVE-2017-7659)\n\n* A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request. (CVE-2017-7668)\n\n* A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:2483", "url": "https://access.redhat.com/errata/RHSA-2017:2483" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1463194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194" }, { "category": "external", "summary": "1463197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197" }, { "category": "external", "summary": "1463199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463199" }, { "category": "external", "summary": "1463205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205" }, { "category": "external", "summary": "1463207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207" }, { "category": "external", "summary": "1470748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2483.json" } ], "title": "Red Hat Security Advisory: httpd24-httpd security update", "tracking": { "current_release_date": "2025-08-03T17:29:36+00:00", "generator": { "date": "2025-08-03T17:29:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2017:2483", "initial_release_date": "2017-08-16T23:04:17+00:00", "revision_history": [ { "date": "2017-08-16T23:04:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-08-16T23:04:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T17:29:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.4-6.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-RHSCL-2.4-7.3.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "product": { "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "product_id": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.25-9.el7.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "product": { "name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "product_id": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.25-9.el7.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "product": { "name": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "product_id": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.25-9.el7.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "product": { "name": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "product_id": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.25-9.el7.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "product": { "name": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "product_id": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.25-9.el7.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "product": { "name": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "product_id": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.25-9.el7.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "product": { "name": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "product_id": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.25-9.el7.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "product": { "name": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "product_id": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.25-9.el7.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "product": { "name": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "product_id": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.25-9.el6.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "product": { "name": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "product_id": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.25-9.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "product": { "name": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "product_id": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.25-9.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "product": { "name": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "product_id": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.25-9.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "product": { "name": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "product_id": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.25-9.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "product": { "name": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "product_id": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.25-9.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "product": { "name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "product_id": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.25-9.el6.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "product": { "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "product_id": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.25-9.el6.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "product": { "name": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "product_id": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-manual@2.4.25-9.el7.1?arch=noarch" } } }, { "category": "product_version", "name": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "product": { "name": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "product_id": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-manual@2.4.25-9.el6.1?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd24-httpd-0:2.4.25-9.el7.1.src", "product": { "name": "httpd24-httpd-0:2.4.25-9.el7.1.src", "product_id": "httpd24-httpd-0:2.4.25-9.el7.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.25-9.el7.1?arch=src" } } }, { "category": "product_version", "name": "httpd24-httpd-0:2.4.25-9.el6.1.src", "product": { "name": "httpd24-httpd-0:2.4.25-9.el6.1.src", "product_id": "httpd24-httpd-0:2.4.25-9.el6.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.25-9.el6.1?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.25-9.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src" }, "product_reference": "httpd24-httpd-0:2.4.25-9.el6.1.src", "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.25-9.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src" }, "product_reference": "httpd24-httpd-0:2.4.25-9.el6.1.src", "relates_to_product_reference": "6Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "relates_to_product_reference": "6Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.25-9.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src" }, "product_reference": "httpd24-httpd-0:2.4.25-9.el6.1.src", "relates_to_product_reference": "6Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "relates_to_product_reference": "6Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.25-9.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src" }, "product_reference": "httpd24-httpd-0:2.4.25-9.el7.1.src", "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.25-9.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src" }, "product_reference": "httpd24-httpd-0:2.4.25-9.el7.1.src", "relates_to_product_reference": "7Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "relates_to_product_reference": "7Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.25-9.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src" }, "product_reference": "httpd24-httpd-0:2.4.25-9.el7.1.src", "relates_to_product_reference": "7Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "relates_to_product_reference": "7Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-2.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-3167", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2017-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1463194" } ], "notes": [ { "category": "description", "text": "It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: ap_get_basic_auth_pw() authentication bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3167" }, { "category": "external", "summary": "RHBZ#1463194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3167", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html", "url": "https://httpd.apache.org/security/vulnerabilities_22.html" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2017-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-08-16T23:04:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2483" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: ap_get_basic_auth_pw() authentication bypass" }, { "cve": "CVE-2017-3169", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2017-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1463197" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_ssl NULL pointer dereference", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3169" }, { "category": "external", "summary": "RHBZ#1463197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3169", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html", "url": "https://httpd.apache.org/security/vulnerabilities_22.html" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2017-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-08-16T23:04:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2483" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_ssl NULL pointer dereference" }, { "cve": "CVE-2017-7659", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2017-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1463199" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the mod_http2 module of httpd. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP/2 request.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_http2 NULL pointer dereference", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7659" }, { "category": "external", "summary": "RHBZ#1463199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463199" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7659", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7659" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7659", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7659" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2017-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-08-16T23:04:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2483" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_http2 NULL pointer dereference" }, { "cve": "CVE-2017-7668", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2017-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1463205" } ], "notes": [ { "category": "description", "text": "A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: ap_find_token() buffer overread", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7668" }, { "category": "external", "summary": "RHBZ#1463205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7668", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7668" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html", "url": "https://httpd.apache.org/security/vulnerabilities_22.html" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2017-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-08-16T23:04:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2483" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: ap_find_token() buffer overread" }, { "cve": "CVE-2017-7679", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1463207" } ], "notes": [ { "category": "description", "text": "A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_mime buffer overread", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7679" }, { "category": "external", "summary": "RHBZ#1463207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7679", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html", "url": "https://httpd.apache.org/security/vulnerabilities_22.html" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2017-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-08-16T23:04:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2483" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_mime buffer overread" }, { "cve": "CVE-2017-9788", "cwe": { "id": "CWE-456", "name": "Missing Initialization of a Variable" }, "discovery_date": "2017-07-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1470748" } ], "notes": [ { "category": "description", "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Uninitialized memory reflection in mod_auth_digest", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-9788" }, { "category": "external", "summary": "RHBZ#1470748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788", "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34", "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27" } ], "release_date": "2017-07-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-08-16T23:04:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2483" }, { "category": "workaround", "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.", "product_ids": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Uninitialized memory reflection in mod_auth_digest" } ] }
wid-sec-w-2025-0370
Vulnerability from csaf_certbund
Published
2017-09-25 22:00
Modified
2025-02-13 23:00
Summary
Apple Mac OS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Apple Mac OS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstelle in Apple Mac OS ausnutzen, um Code mit Kernel Privilegien auszuführen, Sicherheitsvorkehrungen zu umgehen, einen Denial of Service Angriff durchzuführen oder vertrauliche Daten einzusehen.
Betroffene Betriebssysteme
- MacOS X
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Apple Mac OS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstelle in Apple Mac OS ausnutzen, um Code mit Kernel Privilegien auszuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Denial of Service Angriff durchzuf\u00fchren oder vertrauliche Daten einzusehen.", "title": "Angriff" }, { "category": "general", "text": "- MacOS X", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0370 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2017/wid-sec-w-2025-0370.json" }, { "category": "self", "summary": "WID-SEC-2025-0370 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0370" }, { "category": "external", "summary": "Apple Security Advisory HT208144 vom 2017-09-25", "url": "https://support.apple.com/de-de/HT208144" }, { "category": "external", "summary": "Updated Apple Security Advisory HT208144 vom 2017-10-31", "url": "https://lists.apple.com/archives/security-announce/2017/Oct/msg00007.html" }, { "category": "external", "summary": "Updated Apple Security Advisory HT208144 vom 2017-10-31", "url": "https://lists.apple.com/archives/security-announce/2017/Oct/msg00001.html" } ], "source_lang": "en-US", "title": "Apple Mac OS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-02-13T23:00:00.000+00:00", "generator": { "date": "2025-02-14T12:00:12.636+00:00", "engine": { "name": "BSI-WID", "version": "1.3.12" } }, "id": "WID-SEC-W-2025-0370", "initial_release_date": "2017-09-25T22:00:00.000+00:00", "revision_history": [ { "date": "2017-09-25T22:00:00.000+00:00", "number": "1", "summary": "Initial Release" }, { "date": "2017-10-31T23:00:00.000+00:00", "number": "2", "summary": "cve added" }, { "date": "2017-10-31T23:00:00.000+00:00", "number": "3", "summary": "Version nicht vorhanden" }, { "date": "2017-10-31T23:00:00.000+00:00", "number": "4", "summary": "Version nicht vorhanden" }, { "date": "2017-11-21T23:00:00.000+00:00", "number": "5", "summary": "cve added" }, { "date": "2017-11-21T23:00:00.000+00:00", "number": "6", "summary": "Version nicht vorhanden" }, { "date": "2017-12-13T23:00:00.000+00:00", "number": "7", "summary": "New remediations available" }, { "date": "2025-02-13T23:00:00.000+00:00", "number": "8", "summary": "Korrektur" } ], "status": "final", "version": "8" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c10.13", "product": { "name": "Apple macOS \u003c10.13", "product_id": "T010822" } }, { "category": "product_version", "name": "10.13", "product": { "name": "Apple macOS 10.13", "product_id": "T010822-fixed", "product_identification_helper": { "cpe": "cpe:/o:apple:mac_os:10.13" } } } ], "category": "product_name", "name": "macOS" } ], "category": "vendor", "name": "Apple" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-0736", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2016-0736" }, { "cve": "CVE-2016-2161", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2016-2161" }, { "cve": "CVE-2016-4736", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2016-4736" }, { "cve": "CVE-2016-5387", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2016-5387" }, { "cve": "CVE-2016-8740", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2016-8740" }, { "cve": "CVE-2016-8743", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2016-8743" }, { "cve": "CVE-2016-9042", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2016-9042" }, { "cve": "CVE-2016-9063", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2016-9063" }, { "cve": "CVE-2016-9840", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2016-9840" }, { "cve": "CVE-2016-9841", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2016-9841" }, { "cve": "CVE-2016-9842", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2016-9842" }, { "cve": "CVE-2016-9843", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2016-9843" }, { "cve": "CVE-2017-0381", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-0381" }, { "cve": "CVE-2017-1000100", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-1000100" }, { "cve": "CVE-2017-1000101", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-1000101" }, { "cve": "CVE-2017-1000373", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-1000373" }, { "cve": "CVE-2017-10140", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-10140" }, { "cve": "CVE-2017-10989", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-10989" }, { "cve": "CVE-2017-11103", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-11103" }, { "cve": "CVE-2017-11108", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-11108" }, { "cve": "CVE-2017-11541", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-11541" }, { "cve": "CVE-2017-11542", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-11542" }, { "cve": "CVE-2017-11543", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-11543" }, { "cve": "CVE-2017-12893", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12893" }, { "cve": "CVE-2017-12894", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12894" }, { "cve": "CVE-2017-12895", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12895" }, { "cve": "CVE-2017-12896", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12896" }, { "cve": "CVE-2017-12897", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12897" }, { "cve": "CVE-2017-12898", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12898" }, { "cve": "CVE-2017-12899", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12899" }, { "cve": "CVE-2017-12900", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12900" }, { "cve": "CVE-2017-12901", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12901" }, { "cve": "CVE-2017-12902", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12902" }, { "cve": "CVE-2017-12985", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12985" }, { "cve": "CVE-2017-12986", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12986" }, { "cve": "CVE-2017-12987", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12987" }, { "cve": "CVE-2017-12988", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12988" }, { "cve": "CVE-2017-12989", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12989" }, { "cve": "CVE-2017-12990", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12990" }, { "cve": "CVE-2017-12991", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12991" }, { "cve": "CVE-2017-12992", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12992" }, { "cve": "CVE-2017-12993", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12993" }, { "cve": "CVE-2017-12994", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12994" }, { "cve": "CVE-2017-12995", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12995" }, { "cve": "CVE-2017-12996", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12996" }, { "cve": "CVE-2017-12997", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12997" }, { "cve": "CVE-2017-12998", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12998" }, { "cve": "CVE-2017-12999", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12999" }, { "cve": "CVE-2017-13000", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13000" }, { "cve": "CVE-2017-13001", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13001" }, { "cve": "CVE-2017-13002", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13002" }, { "cve": "CVE-2017-13003", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13003" }, { "cve": "CVE-2017-13004", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13004" }, { "cve": "CVE-2017-13005", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13005" }, { "cve": "CVE-2017-13006", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13006" }, { "cve": "CVE-2017-13007", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13007" }, { "cve": "CVE-2017-13008", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13008" }, { "cve": "CVE-2017-13009", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13009" }, { "cve": "CVE-2017-13010", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13010" }, { "cve": "CVE-2017-13011", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13011" }, { "cve": "CVE-2017-13012", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13012" }, { "cve": "CVE-2017-13013", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13013" }, { "cve": "CVE-2017-13014", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13014" }, { "cve": "CVE-2017-13015", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13015" }, { "cve": "CVE-2017-13016", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13016" }, { "cve": "CVE-2017-13017", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13017" }, { "cve": "CVE-2017-13018", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13018" }, { "cve": "CVE-2017-13019", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13019" }, { "cve": "CVE-2017-13020", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13020" }, { "cve": "CVE-2017-13021", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13021" }, { "cve": "CVE-2017-13022", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13022" }, { "cve": "CVE-2017-13023", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13023" }, { "cve": "CVE-2017-13024", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13024" }, { "cve": "CVE-2017-13025", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13025" }, { "cve": "CVE-2017-13026", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13026" }, { "cve": "CVE-2017-13027", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13027" }, { "cve": "CVE-2017-13028", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13028" }, { "cve": "CVE-2017-13029", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13029" }, { "cve": "CVE-2017-13030", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13030" }, { "cve": "CVE-2017-13031", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13031" }, { "cve": "CVE-2017-13032", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13032" }, { "cve": "CVE-2017-13033", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13033" }, { "cve": "CVE-2017-13034", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13034" }, { "cve": "CVE-2017-13035", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13035" }, { "cve": "CVE-2017-13036", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13036" }, { "cve": "CVE-2017-13037", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13037" }, { "cve": "CVE-2017-13038", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13038" }, { "cve": "CVE-2017-13039", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13039" }, { "cve": "CVE-2017-13040", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13040" }, { "cve": "CVE-2017-13041", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13041" }, { "cve": "CVE-2017-13042", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13042" }, { "cve": "CVE-2017-13043", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13043" }, { "cve": "CVE-2017-13044", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13044" }, { "cve": "CVE-2017-13045", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13045" }, { "cve": "CVE-2017-13046", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13046" }, { "cve": "CVE-2017-13047", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13047" }, { "cve": "CVE-2017-13048", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13048" }, { "cve": "CVE-2017-13049", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13049" }, { "cve": "CVE-2017-13050", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13050" }, { "cve": "CVE-2017-13051", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13051" }, { "cve": "CVE-2017-13052", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13052" }, { "cve": "CVE-2017-13053", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13053" }, { "cve": "CVE-2017-13054", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13054" }, { "cve": "CVE-2017-13055", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13055" }, { "cve": "CVE-2017-13077", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13077" }, { "cve": "CVE-2017-13078", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13078" }, { "cve": "CVE-2017-13080", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13080" }, { "cve": "CVE-2017-13687", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13687" }, { "cve": "CVE-2017-13688", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13688" }, { "cve": "CVE-2017-13689", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13689" }, { "cve": "CVE-2017-13690", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13690" }, { "cve": "CVE-2017-13725", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13725" }, { "cve": "CVE-2017-13782", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13782" }, { "cve": "CVE-2017-13786", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13786" }, { "cve": "CVE-2017-13799", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13799" }, { "cve": "CVE-2017-13800", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13800" }, { "cve": "CVE-2017-13801", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13801" }, { "cve": "CVE-2017-13804", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13804" }, { "cve": "CVE-2017-13807", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13807" }, { "cve": "CVE-2017-13808", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13808" }, { "cve": "CVE-2017-13809", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13809" }, { "cve": "CVE-2017-13810", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13810" }, { "cve": "CVE-2017-13811", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13811" }, { "cve": "CVE-2017-13812", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13812" }, { "cve": "CVE-2017-13813", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13813" }, { "cve": "CVE-2017-13814", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13814" }, { "cve": "CVE-2017-13815", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13815" }, { "cve": "CVE-2017-13816", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13816" }, { "cve": "CVE-2017-13817", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13817" }, { "cve": "CVE-2017-13818", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13818" }, { "cve": "CVE-2017-13819", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13819" }, { "cve": "CVE-2017-13820", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13820" }, { "cve": "CVE-2017-13821", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13821" }, { "cve": "CVE-2017-13822", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13822" }, { "cve": "CVE-2017-13823", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13823" }, { "cve": "CVE-2017-13824", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13824" }, { "cve": "CVE-2017-13825", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13825" }, { "cve": "CVE-2017-13826", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13826" }, { "cve": "CVE-2017-13827", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13827" }, { "cve": "CVE-2017-13828", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13828" }, { "cve": "CVE-2017-13829", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13829" }, { "cve": "CVE-2017-13830", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13830" }, { "cve": "CVE-2017-13831", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13831" }, { "cve": "CVE-2017-13832", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13832" }, { "cve": "CVE-2017-13833", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13833" }, { "cve": "CVE-2017-13834", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13834" }, { "cve": "CVE-2017-13836", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13836" }, { "cve": "CVE-2017-13837", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13837" }, { "cve": "CVE-2017-13838", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13838" }, { "cve": "CVE-2017-13839", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13839" }, { "cve": "CVE-2017-13840", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13840" }, { "cve": "CVE-2017-13841", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13841" }, { "cve": "CVE-2017-13842", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13842" }, { "cve": "CVE-2017-13843", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13843" }, { "cve": "CVE-2017-13846", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13846" }, { "cve": "CVE-2017-13851", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13851" }, { "cve": "CVE-2017-13854", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13854" }, { "cve": "CVE-2017-3167", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-3167" }, { "cve": "CVE-2017-3169", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-3169" }, { "cve": "CVE-2017-6451", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-6451" }, { "cve": "CVE-2017-6452", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-6452" }, { "cve": "CVE-2017-6455", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-6455" }, { "cve": "CVE-2017-6458", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-6458" }, { "cve": "CVE-2017-6459", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-6459" }, { "cve": "CVE-2017-6460", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-6460" }, { "cve": "CVE-2017-6462", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-6462" }, { "cve": "CVE-2017-6463", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-6463" }, { "cve": "CVE-2017-6464", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-6464" }, { "cve": "CVE-2017-7074", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7074" }, { "cve": "CVE-2017-7077", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7077" }, { "cve": "CVE-2017-7078", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7078" }, { "cve": "CVE-2017-7080", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7080" }, { "cve": "CVE-2017-7082", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7082" }, { "cve": "CVE-2017-7083", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7083" }, { "cve": "CVE-2017-7084", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7084" }, { "cve": "CVE-2017-7086", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7086" }, { "cve": "CVE-2017-7114", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7114" }, { "cve": "CVE-2017-7119", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7119" }, { "cve": "CVE-2017-7121", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7121" }, { "cve": "CVE-2017-7122", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7122" }, { "cve": "CVE-2017-7123", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7123" }, { "cve": "CVE-2017-7124", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7124" }, { "cve": "CVE-2017-7125", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7125" }, { "cve": "CVE-2017-7126", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7126" }, { "cve": "CVE-2017-7127", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7127" }, { "cve": "CVE-2017-7128", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7128" }, { "cve": "CVE-2017-7129", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7129" }, { "cve": "CVE-2017-7130", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7130" }, { "cve": "CVE-2017-7132", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7132" }, { "cve": "CVE-2017-7138", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7138" }, { "cve": "CVE-2017-7141", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7141" }, { "cve": "CVE-2017-7143", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7143" }, { "cve": "CVE-2017-7144", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7144" }, { "cve": "CVE-2017-7659", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7659" }, { "cve": "CVE-2017-7668", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7668" }, { "cve": "CVE-2017-7679", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7679" }, { "cve": "CVE-2017-9233", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-9233" }, { "cve": "CVE-2017-9788", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-9788" }, { "cve": "CVE-2017-9789", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-9789" } ] }
suse-su-2018:0261-1
Vulnerability from csaf_suse
Published
2018-01-29 10:41
Modified
2018-01-29 10:41
Summary
Recommended update for apache2
Notes
Title of the patch
Recommended update for apache2
Description of the patch
This update for apache2 fixes several issues.
These security issues were fixed:
- CVE-2017-9789: When under stress (closing many connections) the HTTP/2
handling code would sometimes access memory after it has been freed, resulting
in potentially erratic behaviour (bsc#1048575).
- CVE-2017-7659: A maliciously constructed HTTP/2 request could cause mod_http2
to dereference a NULL pointer and crash the server process (bsc#1045160).
These non-security issues were fixed:
- Use the full path to a2enmod and a2dismod in the apache-22-24-upgrade script (bsc#1042037)
- Fall back to 'localhost' as hostname in gensslcert (bsc#1057406)
Patchnames
SUSE-SLE-RPI-12-SP2-2018-179,SUSE-SLE-SDK-12-SP2-2018-179,SUSE-SLE-SDK-12-SP3-2018-179,SUSE-SLE-SERVER-12-SP2-2018-179,SUSE-SLE-SERVER-12-SP3-2018-179
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Recommended update for apache2", "title": "Title of the patch" }, { "category": "description", "text": "This update for apache2 fixes several issues.\n\nThese security issues were fixed:\n\n- CVE-2017-9789: When under stress (closing many connections) the HTTP/2\n handling code would sometimes access memory after it has been freed, resulting\n in potentially erratic behaviour (bsc#1048575).\n- CVE-2017-7659: A maliciously constructed HTTP/2 request could cause mod_http2\n to dereference a NULL pointer and crash the server process (bsc#1045160).\n\nThese non-security issues were fixed:\n\n- Use the full path to a2enmod and a2dismod in the apache-22-24-upgrade script (bsc#1042037)\n- Fall back to \u0027localhost\u0027 as hostname in gensslcert (bsc#1057406)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-RPI-12-SP2-2018-179,SUSE-SLE-SDK-12-SP2-2018-179,SUSE-SLE-SDK-12-SP3-2018-179,SUSE-SLE-SERVER-12-SP2-2018-179,SUSE-SLE-SERVER-12-SP3-2018-179", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0261-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:0261-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180261-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:0261-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-January/003657.html" }, { "category": "self", "summary": "SUSE Bug 1042037", "url": "https://bugzilla.suse.com/1042037" }, { "category": "self", "summary": "SUSE Bug 1045160", "url": "https://bugzilla.suse.com/1045160" }, { "category": "self", "summary": "SUSE Bug 1048575", "url": "https://bugzilla.suse.com/1048575" }, { "category": "self", "summary": "SUSE Bug 1057406", "url": "https://bugzilla.suse.com/1057406" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7659 page", "url": "https://www.suse.com/security/cve/CVE-2017-7659/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9789 page", "url": "https://www.suse.com/security/cve/CVE-2017-9789/" } ], "title": "Recommended update for apache2", "tracking": { "current_release_date": "2018-01-29T10:41:29Z", "generator": { "date": "2018-01-29T10:41:29Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:0261-1", "initial_release_date": "2018-01-29T10:41:29Z", "revision_history": [ { "date": "2018-01-29T10:41:29Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "apache2-2.4.23-29.13.1.aarch64", "product": { "name": "apache2-2.4.23-29.13.1.aarch64", "product_id": "apache2-2.4.23-29.13.1.aarch64" } }, { "category": "product_version", "name": "apache2-example-pages-2.4.23-29.13.1.aarch64", "product": { "name": "apache2-example-pages-2.4.23-29.13.1.aarch64", "product_id": "apache2-example-pages-2.4.23-29.13.1.aarch64" } }, { "category": "product_version", "name": "apache2-prefork-2.4.23-29.13.1.aarch64", "product": { "name": "apache2-prefork-2.4.23-29.13.1.aarch64", "product_id": "apache2-prefork-2.4.23-29.13.1.aarch64" } }, { "category": "product_version", "name": "apache2-utils-2.4.23-29.13.1.aarch64", "product": { "name": "apache2-utils-2.4.23-29.13.1.aarch64", "product_id": "apache2-utils-2.4.23-29.13.1.aarch64" } }, { "category": "product_version", "name": "apache2-worker-2.4.23-29.13.1.aarch64", "product": { "name": "apache2-worker-2.4.23-29.13.1.aarch64", "product_id": "apache2-worker-2.4.23-29.13.1.aarch64" } }, { "category": "product_version", "name": "apache2-devel-2.4.23-29.13.1.aarch64", "product": { "name": "apache2-devel-2.4.23-29.13.1.aarch64", "product_id": "apache2-devel-2.4.23-29.13.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "apache2-doc-2.4.23-29.13.1.noarch", "product": { "name": "apache2-doc-2.4.23-29.13.1.noarch", "product_id": "apache2-doc-2.4.23-29.13.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "apache2-devel-2.4.23-29.13.1.ppc64le", "product": { "name": "apache2-devel-2.4.23-29.13.1.ppc64le", "product_id": "apache2-devel-2.4.23-29.13.1.ppc64le" } }, { "category": "product_version", "name": "apache2-2.4.23-29.13.1.ppc64le", "product": { "name": "apache2-2.4.23-29.13.1.ppc64le", "product_id": "apache2-2.4.23-29.13.1.ppc64le" } }, { "category": "product_version", "name": "apache2-example-pages-2.4.23-29.13.1.ppc64le", "product": { "name": "apache2-example-pages-2.4.23-29.13.1.ppc64le", "product_id": "apache2-example-pages-2.4.23-29.13.1.ppc64le" } }, { "category": "product_version", "name": "apache2-prefork-2.4.23-29.13.1.ppc64le", "product": { "name": "apache2-prefork-2.4.23-29.13.1.ppc64le", "product_id": "apache2-prefork-2.4.23-29.13.1.ppc64le" } }, { "category": "product_version", "name": "apache2-utils-2.4.23-29.13.1.ppc64le", "product": { "name": "apache2-utils-2.4.23-29.13.1.ppc64le", "product_id": "apache2-utils-2.4.23-29.13.1.ppc64le" } }, { "category": "product_version", "name": "apache2-worker-2.4.23-29.13.1.ppc64le", "product": { "name": "apache2-worker-2.4.23-29.13.1.ppc64le", "product_id": "apache2-worker-2.4.23-29.13.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "apache2-devel-2.4.23-29.13.1.s390x", "product": { "name": "apache2-devel-2.4.23-29.13.1.s390x", "product_id": "apache2-devel-2.4.23-29.13.1.s390x" } }, { "category": "product_version", "name": "apache2-2.4.23-29.13.1.s390x", "product": { "name": "apache2-2.4.23-29.13.1.s390x", "product_id": "apache2-2.4.23-29.13.1.s390x" } }, { "category": "product_version", "name": "apache2-example-pages-2.4.23-29.13.1.s390x", "product": { "name": "apache2-example-pages-2.4.23-29.13.1.s390x", "product_id": "apache2-example-pages-2.4.23-29.13.1.s390x" } }, { "category": "product_version", "name": "apache2-prefork-2.4.23-29.13.1.s390x", "product": { "name": "apache2-prefork-2.4.23-29.13.1.s390x", "product_id": "apache2-prefork-2.4.23-29.13.1.s390x" } }, { "category": "product_version", "name": "apache2-utils-2.4.23-29.13.1.s390x", "product": { "name": "apache2-utils-2.4.23-29.13.1.s390x", "product_id": "apache2-utils-2.4.23-29.13.1.s390x" } }, { "category": "product_version", "name": "apache2-worker-2.4.23-29.13.1.s390x", "product": { "name": "apache2-worker-2.4.23-29.13.1.s390x", "product_id": "apache2-worker-2.4.23-29.13.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "apache2-devel-2.4.23-29.13.1.x86_64", "product": { "name": "apache2-devel-2.4.23-29.13.1.x86_64", "product_id": "apache2-devel-2.4.23-29.13.1.x86_64" } }, { "category": "product_version", "name": "apache2-2.4.23-29.13.1.x86_64", "product": { "name": "apache2-2.4.23-29.13.1.x86_64", "product_id": "apache2-2.4.23-29.13.1.x86_64" } }, { "category": "product_version", "name": "apache2-example-pages-2.4.23-29.13.1.x86_64", "product": { "name": "apache2-example-pages-2.4.23-29.13.1.x86_64", "product_id": "apache2-example-pages-2.4.23-29.13.1.x86_64" } }, { "category": "product_version", "name": "apache2-prefork-2.4.23-29.13.1.x86_64", "product": { "name": "apache2-prefork-2.4.23-29.13.1.x86_64", "product_id": "apache2-prefork-2.4.23-29.13.1.x86_64" } }, { "category": "product_version", "name": "apache2-utils-2.4.23-29.13.1.x86_64", "product": { "name": "apache2-utils-2.4.23-29.13.1.x86_64", "product_id": "apache2-utils-2.4.23-29.13.1.x86_64" } }, { "category": "product_version", "name": "apache2-worker-2.4.23-29.13.1.x86_64", "product": { "name": "apache2-worker-2.4.23-29.13.1.x86_64", "product_id": "apache2-worker-2.4.23-29.13.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP2", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2", "product": { "name": "SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3", "product": { "name": "SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.23-29.13.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-2.4.23-29.13.1.aarch64" }, "product_reference": "apache2-2.4.23-29.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-doc-2.4.23-29.13.1.noarch as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-doc-2.4.23-29.13.1.noarch" }, "product_reference": "apache2-doc-2.4.23-29.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.4.23-29.13.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-example-pages-2.4.23-29.13.1.aarch64" }, "product_reference": "apache2-example-pages-2.4.23-29.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.23-29.13.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-prefork-2.4.23-29.13.1.aarch64" }, "product_reference": "apache2-prefork-2.4.23-29.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.23-29.13.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-utils-2.4.23-29.13.1.aarch64" }, "product_reference": "apache2-utils-2.4.23-29.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.23-29.13.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-worker-2.4.23-29.13.1.aarch64" }, "product_reference": "apache2-worker-2.4.23-29.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.4.23-29.13.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.13.1.aarch64" }, "product_reference": "apache2-devel-2.4.23-29.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.4.23-29.13.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.13.1.ppc64le" }, "product_reference": "apache2-devel-2.4.23-29.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.4.23-29.13.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.13.1.s390x" }, "product_reference": "apache2-devel-2.4.23-29.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.4.23-29.13.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.13.1.x86_64" }, "product_reference": "apache2-devel-2.4.23-29.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.4.23-29.13.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.13.1.aarch64" }, "product_reference": "apache2-devel-2.4.23-29.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.4.23-29.13.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.13.1.ppc64le" }, "product_reference": "apache2-devel-2.4.23-29.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.4.23-29.13.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.13.1.s390x" }, "product_reference": "apache2-devel-2.4.23-29.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.4.23-29.13.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.13.1.x86_64" }, "product_reference": "apache2-devel-2.4.23-29.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.23-29.13.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.13.1.aarch64" }, "product_reference": "apache2-2.4.23-29.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.23-29.13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.13.1.ppc64le" }, "product_reference": "apache2-2.4.23-29.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.23-29.13.1.s390x as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.13.1.s390x" }, "product_reference": "apache2-2.4.23-29.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.23-29.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.13.1.x86_64" }, "product_reference": "apache2-2.4.23-29.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-doc-2.4.23-29.13.1.noarch as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-doc-2.4.23-29.13.1.noarch" }, "product_reference": "apache2-doc-2.4.23-29.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.4.23-29.13.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.13.1.aarch64" }, "product_reference": "apache2-example-pages-2.4.23-29.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.4.23-29.13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.13.1.ppc64le" }, "product_reference": "apache2-example-pages-2.4.23-29.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.4.23-29.13.1.s390x as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.13.1.s390x" }, "product_reference": "apache2-example-pages-2.4.23-29.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.4.23-29.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.13.1.x86_64" }, "product_reference": "apache2-example-pages-2.4.23-29.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.23-29.13.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.13.1.aarch64" }, "product_reference": "apache2-prefork-2.4.23-29.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.23-29.13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.13.1.ppc64le" }, "product_reference": "apache2-prefork-2.4.23-29.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.23-29.13.1.s390x as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.13.1.s390x" }, "product_reference": "apache2-prefork-2.4.23-29.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.23-29.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.13.1.x86_64" }, "product_reference": "apache2-prefork-2.4.23-29.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.23-29.13.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.13.1.aarch64" }, "product_reference": "apache2-utils-2.4.23-29.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.23-29.13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.13.1.ppc64le" }, "product_reference": "apache2-utils-2.4.23-29.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.23-29.13.1.s390x as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.13.1.s390x" }, "product_reference": "apache2-utils-2.4.23-29.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.23-29.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.13.1.x86_64" }, "product_reference": "apache2-utils-2.4.23-29.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.23-29.13.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.13.1.aarch64" }, "product_reference": "apache2-worker-2.4.23-29.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.23-29.13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.13.1.ppc64le" }, "product_reference": "apache2-worker-2.4.23-29.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.23-29.13.1.s390x as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.13.1.s390x" }, "product_reference": "apache2-worker-2.4.23-29.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.23-29.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.13.1.x86_64" }, "product_reference": "apache2-worker-2.4.23-29.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.23-29.13.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.13.1.aarch64" }, "product_reference": "apache2-2.4.23-29.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.23-29.13.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.13.1.ppc64le" }, "product_reference": "apache2-2.4.23-29.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.23-29.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.13.1.s390x" }, "product_reference": "apache2-2.4.23-29.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.23-29.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.13.1.x86_64" }, "product_reference": "apache2-2.4.23-29.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-doc-2.4.23-29.13.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.13.1.noarch" }, "product_reference": "apache2-doc-2.4.23-29.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.4.23-29.13.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.13.1.aarch64" }, "product_reference": "apache2-example-pages-2.4.23-29.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.4.23-29.13.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.13.1.ppc64le" }, "product_reference": "apache2-example-pages-2.4.23-29.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.4.23-29.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.13.1.s390x" }, "product_reference": "apache2-example-pages-2.4.23-29.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.4.23-29.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.13.1.x86_64" }, "product_reference": "apache2-example-pages-2.4.23-29.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.23-29.13.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.13.1.aarch64" }, "product_reference": "apache2-prefork-2.4.23-29.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.23-29.13.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.13.1.ppc64le" }, "product_reference": "apache2-prefork-2.4.23-29.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.23-29.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.13.1.s390x" }, "product_reference": "apache2-prefork-2.4.23-29.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.23-29.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.13.1.x86_64" }, "product_reference": "apache2-prefork-2.4.23-29.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.23-29.13.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.13.1.aarch64" }, "product_reference": "apache2-utils-2.4.23-29.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.23-29.13.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.13.1.ppc64le" }, "product_reference": "apache2-utils-2.4.23-29.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.23-29.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.13.1.s390x" }, "product_reference": "apache2-utils-2.4.23-29.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.23-29.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.13.1.x86_64" }, "product_reference": "apache2-utils-2.4.23-29.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.23-29.13.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.13.1.aarch64" }, "product_reference": "apache2-worker-2.4.23-29.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.23-29.13.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.13.1.ppc64le" }, "product_reference": "apache2-worker-2.4.23-29.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.23-29.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.13.1.s390x" }, "product_reference": "apache2-worker-2.4.23-29.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.23-29.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.13.1.x86_64" }, "product_reference": "apache2-worker-2.4.23-29.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.23-29.13.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.13.1.aarch64" }, "product_reference": "apache2-2.4.23-29.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.23-29.13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.13.1.ppc64le" }, "product_reference": "apache2-2.4.23-29.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.23-29.13.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.13.1.s390x" }, "product_reference": "apache2-2.4.23-29.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.23-29.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.13.1.x86_64" }, "product_reference": "apache2-2.4.23-29.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-doc-2.4.23-29.13.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.13.1.noarch" }, "product_reference": "apache2-doc-2.4.23-29.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.4.23-29.13.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.13.1.aarch64" }, "product_reference": "apache2-example-pages-2.4.23-29.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.4.23-29.13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.13.1.ppc64le" }, "product_reference": "apache2-example-pages-2.4.23-29.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.4.23-29.13.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.13.1.s390x" }, "product_reference": "apache2-example-pages-2.4.23-29.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.4.23-29.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.13.1.x86_64" }, "product_reference": "apache2-example-pages-2.4.23-29.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.23-29.13.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.13.1.aarch64" }, "product_reference": "apache2-prefork-2.4.23-29.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.23-29.13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.13.1.ppc64le" }, "product_reference": "apache2-prefork-2.4.23-29.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.23-29.13.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.13.1.s390x" }, "product_reference": "apache2-prefork-2.4.23-29.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.23-29.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.13.1.x86_64" }, "product_reference": "apache2-prefork-2.4.23-29.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.23-29.13.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.13.1.aarch64" }, "product_reference": "apache2-utils-2.4.23-29.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.23-29.13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.13.1.ppc64le" }, "product_reference": "apache2-utils-2.4.23-29.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.23-29.13.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.13.1.s390x" }, "product_reference": "apache2-utils-2.4.23-29.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.23-29.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.13.1.x86_64" }, "product_reference": "apache2-utils-2.4.23-29.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.23-29.13.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.13.1.aarch64" }, "product_reference": "apache2-worker-2.4.23-29.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.23-29.13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.13.1.ppc64le" }, "product_reference": "apache2-worker-2.4.23-29.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.23-29.13.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.13.1.s390x" }, "product_reference": "apache2-worker-2.4.23-29.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.23-29.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.13.1.x86_64" }, "product_reference": "apache2-worker-2.4.23-29.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.23-29.13.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.13.1.aarch64" }, "product_reference": "apache2-2.4.23-29.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.23-29.13.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.13.1.ppc64le" }, "product_reference": "apache2-2.4.23-29.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.23-29.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.13.1.s390x" }, "product_reference": "apache2-2.4.23-29.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.23-29.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.13.1.x86_64" }, "product_reference": "apache2-2.4.23-29.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-doc-2.4.23-29.13.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.13.1.noarch" }, "product_reference": "apache2-doc-2.4.23-29.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.4.23-29.13.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.13.1.aarch64" }, "product_reference": "apache2-example-pages-2.4.23-29.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.4.23-29.13.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.13.1.ppc64le" }, "product_reference": "apache2-example-pages-2.4.23-29.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.4.23-29.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.13.1.s390x" }, "product_reference": "apache2-example-pages-2.4.23-29.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.4.23-29.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.13.1.x86_64" }, "product_reference": "apache2-example-pages-2.4.23-29.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.23-29.13.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.13.1.aarch64" }, "product_reference": "apache2-prefork-2.4.23-29.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.23-29.13.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.13.1.ppc64le" }, "product_reference": "apache2-prefork-2.4.23-29.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.23-29.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.13.1.s390x" }, "product_reference": "apache2-prefork-2.4.23-29.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.23-29.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.13.1.x86_64" }, "product_reference": "apache2-prefork-2.4.23-29.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.23-29.13.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.13.1.aarch64" }, "product_reference": "apache2-utils-2.4.23-29.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.23-29.13.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.13.1.ppc64le" }, "product_reference": "apache2-utils-2.4.23-29.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.23-29.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.13.1.s390x" }, "product_reference": "apache2-utils-2.4.23-29.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.23-29.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.13.1.x86_64" }, "product_reference": "apache2-utils-2.4.23-29.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.23-29.13.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.13.1.aarch64" }, "product_reference": "apache2-worker-2.4.23-29.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.23-29.13.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.13.1.ppc64le" }, "product_reference": "apache2-worker-2.4.23-29.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.23-29.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.13.1.s390x" }, "product_reference": "apache2-worker-2.4.23-29.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.23-29.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.13.1.x86_64" }, "product_reference": "apache2-worker-2.4.23-29.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-7659", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7659" } ], "notes": [ { "category": "general", "text": "A maliciously constructed HTTP/2 request could cause mod_http2 in Apache HTTP Server 2.4.24, 2.4.25 to dereference a NULL pointer and crash the server process.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:apache2-doc-2.4.23-29.13.1.noarch", "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-doc-2.4.23-29.13.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-example-pages-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-prefork-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-utils-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-worker-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7659", "url": "https://www.suse.com/security/cve/CVE-2017-7659" }, { "category": "external", "summary": "SUSE Bug 1045160 for CVE-2017-7659", "url": "https://bugzilla.suse.com/1045160" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:apache2-doc-2.4.23-29.13.1.noarch", "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-doc-2.4.23-29.13.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-example-pages-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-prefork-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-utils-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-worker-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:apache2-doc-2.4.23-29.13.1.noarch", "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-doc-2.4.23-29.13.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-example-pages-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-prefork-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-utils-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-worker-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-01-29T10:41:29Z", "details": "low" } ], "title": "CVE-2017-7659" }, { "cve": "CVE-2017-9789", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9789" } ], "notes": [ { "category": "general", "text": "When under stress, closing many connections, the HTTP/2 handling code in Apache httpd 2.4.26 would sometimes access memory after it has been freed, resulting in potentially erratic behaviour.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:apache2-doc-2.4.23-29.13.1.noarch", "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-doc-2.4.23-29.13.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-example-pages-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-prefork-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-utils-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-worker-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9789", "url": "https://www.suse.com/security/cve/CVE-2017-9789" }, { "category": "external", "summary": "SUSE Bug 1048575 for CVE-2017-9789", "url": "https://bugzilla.suse.com/1048575" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:apache2-doc-2.4.23-29.13.1.noarch", "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-doc-2.4.23-29.13.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-example-pages-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-prefork-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-utils-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-worker-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:apache2-doc-2.4.23-29.13.1.noarch", "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-doc-2.4.23-29.13.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-example-pages-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-prefork-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-utils-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-worker-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-01-29T10:41:29Z", "details": "moderate" } ], "title": "CVE-2017-9789" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…